A remote code execution vulnerability exists in the Windows agent component of SecureConnector due to improper access controls on a named pipe. The pipe is accessible to the Everyone group and does not restrict remote connections, allowing any network-based attacker to connect without authentication. By interacting with this pipe, an attacker can redirect the agent to communicate with a rogue server that can issue commands via the SecureConnector Agent. This does not impact Linux or OSX Secure Connector.
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | High |
Availability Impact | High |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Vulnerability Complexity | High |
Vulnerability Impact | High |
Authentication | |
Remediation Level | Unavailable |
Report Confidence | Confirmed |
Environmental Score | |
User Defined |
Epss Score | 0.00195 |
---|---|
Epss Percentile | 0.42023 |
ریسک پائین:: این آسیب پذیری احتمال ارائه Exploit پائینی دارد. به روز رسانی و نظارت معمولی را لحاظ نمائید.
CPE | Vendor | Product | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:forescout:secureconnector:*:*:*:*:*:*:*:* | forescout | secureconnector | * | * |
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* | microsoft | windows | - | * |
لینک | منبع | تگ ها |
---|---|---|
https://forescout.my.site.com/support/s/article/ | Permissions Required |