Description
Secdo tries to execute a script at a hardcoded path if present, which allows a local authenticated user with 'create folders or append data' access to the root of the OS disk (C:\) to gain system privileges if the path does not already exist or is writable. This issue affects all versions of Secdo for Windows.
Published: 2020-04-08
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

This product is no longer supported and the issue is not going to be fixed. The issue can be completely mitigated by ensuring that unprivileged users do not have 'create folder' access on the root of the filesystem such as C:\ or on a folder named C:\Common.


Vendor Workaround

This issue can be mitigated by : - Ensure unprivileged users do not have 'create folder' access on the root of filesystem such as C:\. or - Creating a folder named C:\Common and ensuring unprivileged users do not have 'create folder' access.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-12774 Secdo tries to execute a script at a hardcoded path if present, which allows a local authenticated user with 'create folders or append data' access to the root of the OS disk (C:\) to gain system privileges if the path does not already exist or is writable. This issue affects all versions of Secdo for Windows.
History

No history.

Subscriptions

Microsoft Windows
Paloaltonetworks Secdo
cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-09-17T04:20:08.232Z

Reserved: 2019-12-04T00:00:00.000Z

Link: CVE-2020-1984

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-08T19:15:13.477

Modified: 2024-11-21T05:11:47.203

Link: CVE-2020-1984

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses