Multiple files and folders in Utimaco SecurityServer 4.20.0.4 and 4.31.1.0. are installed with Read/Write permissions for authenticated users, which allows for binaries to be manipulated by non-administrator users. Additionally, entries are made to the PATH environment variable which, in conjunction with these weak permissions, could enable an attacker to perform a DLL hijacking attack.
References
Link | Resource |
---|---|
https://hsm.utimaco.com/products-hardware-security-modules/general-purpose-hsm/ | Exploit Vendor Advisory |
https://secureyourit.co.uk/wp/2021/03/13/utimaco-cve-2020-26155/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-03-18 10:15
Updated : 2021-06-17 10:04
NVD link : CVE-2020-26155
Mitre link : CVE-2020-26155
JSON object : View
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
Products Affected
microsoft
- windows
utimaco
- cryptoserver_cp5_firmware
- paymentserver_firmware
- paymentserver_hybrid_firmware
- cryptoserver_cp5_vs-nfd_firmware
- block-safe_firmware
- securityserver_firmware