← Volver a CVEs
CVE-2019-6008
HIGH7.8
Descripcion
An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ? R3.05.01), and InsightSuiteAE (R1.01.00 ? R1.06.00)) allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges.
Detalles CVE
Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado12/26/2019
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
yokogawa:exaopcyokogawa:exaplogyokogawa:exaquantumyokogawa:exaquantum\/batchyokogawa:exarqeyokogawa:exasmocyokogawa:ga10yokogawa:insightsuiteae
Debilidades (CWE)
CWE-428
Referencias
http://jvn.jp/vu/JVNVU98228725/index.html(vultures@jpcert.or.jp)
https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/(vultures@jpcert.or.jp)
http://jvn.jp/vu/JVNVU98228725/index.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.