Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud prior to version 2020 patch E have bug that allows a local user to execute arbitrary code via execution compromised file placed by an attacker with administrator rights. No privilege escalation. Possible whitelisting bypass some of the security products
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Kaspersky

Published: 2019-12-02T20:43:52

Updated: 2024-08-05T00:56:22.341Z

Reserved: 2019-08-27T00:00:00

Link: CVE-2019-15689

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2019-12-02T21:15:16.733

Modified: 2019-12-18T17:15:26.827

Link: CVE-2019-15689

cve-icon Redhat

No data.