Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:tencent:qqbrowser:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FF66887-361B-4199-BAEE-3C2503FD56C9", "versionEndExcluding": "10.5.3870.400", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "QQBrowser before 10.5.3870.400 installs a Windows service TsService.exe. This file is writable by anyone belonging to the NT AUTHORITY\\Authenticated Users group, which includes all local and remote users. This can be abused by local attackers to escalate privileges to NT AUTHORITY\\SYSTEM by writing a malicious executable to the location of TsService."}, {"lang": "es", "value": "QQBrowser versiones anteriores a 10.5.3870.400, instala un servicio TsService.exe de Windows. Este archivo puede ser escrito por cualquier persona que pertenezca al grupo de Usuarios NT AUTHORITY\\Authenticated, que incluye a todos los usuarios locales y remotos. Los atacantes locales pueden abusar de esto para escalar privilegios a NT AUTHORITY\\SYSTEM escribiendo un ejecutable malicioso en la ubicaci\u00f3n de TsService."}], "id": "CVE-2020-10551", "lastModified": "2024-11-21T04:55:33.927", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-04-09T13:15:12.560", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/seqred-s-a/CVE-2020-10551"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://seqred.pl/en/cve-2020-10551-privilege-escalation-in-qqbrowser/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/seqred-s-a/CVE-2020-10551"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://seqred.pl/en/cve-2020-10551-privilege-escalation-in-qqbrowser/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-732"}], "source": "nvd@nist.gov", "type": "Primary"}]}