The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from command injection vulnerability. Local users can use this vulnerability to execute code with NT\SYSTEM privilege.
References
Link | Resource |
---|---|
https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf | Permissions Required Release Notes Vendor Advisory |
https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client | Permissions Required Vendor Advisory |
https://airbus-seclab.github.io/advisories/netskope.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-09-26 09:15
Updated : 2019-10-09 16:45
NVD link : CVE-2019-12091
Mitre link : CVE-2019-12091
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
netskope
- netskope