An unauthenticated attacker with physical access to a computer with NetSetMan Pro before 5.0 installed, that has the pre-logon profile switch button within the Windows logon screen enabled, is able to drop to an administrative shell and execute arbitrary commands as SYSTEM via the "save log to file" feature. To accomplish this, the attacker can navigate to cmd.exe.
References
Link | Resource |
---|---|
https://www.secuvera.de/advisories/secuvera-SA-2021-01.txt | Exploit Third Party Advisory |
https://www.netsetman.com | Vendor Advisory |
https://www.secuvera.de | Third Party Advisory |
http://seclists.org/fulldisclosure/2021/Jun/17 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/163097/NetSetManPro-4.7.2-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2021-06-10 09:15
Updated : 2021-06-21 17:52
NVD link : CVE-2021-34546
Mitre link : CVE-2021-34546
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
netsetman
- netsetman