In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a file. This is limited in scope to the collection of process-execution telemetry, for executions against specific files where the SYSTEM user was denied access to the source file.
References
Link | Resource |
---|---|
https://www.secureworks.com/resources/ds-aetd-red-cloak-data-sheet | Vendor Advisory |
https://medium.com/@CowbellSteve/secureworks-red-cloak-local-bypass-bfaed2be407e | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-12-06 08:15
Updated : 2019-12-17 12:36
NVD link : CVE-2019-19620
Mitre link : CVE-2019-19620
JSON object : View
CWE
CWE-281
Improper Preservation of Permissions
Products Affected
dell
- red_cloak_windows_agent