Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs for finding this vulnerability and for reporting it to us.
References
Link | Resource |
---|---|
https://help.forcepoint.com/security/CVE/CVE-2019-6145.html | Vendor Advisory |
https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: forcepoint
Published: 2019-09-20T19:56:34
Updated: 2021-09-10T17:04:26
Reserved: 2019-01-11T00:00:00
Link: CVE-2019-6145
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-09-20T20:15:11.320
Modified: 2022-04-18T16:15:10.427
Link: CVE-2019-6145
JSON object: View
Redhat Information
No data.
CWE