Description
Privilege escalation via arbitrary file write in pritunl electron client 1.0.1116.6 through v1.2.2550.20. Successful exploitation of the issue may allow an attacker to execute code on the effected system with root privileges.
Published: 2020-11-19
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-18619 Privilege escalation via arbitrary file write in pritunl electron client 1.0.1116.6 through v1.2.2550.20. Successful exploitation of the issue may allow an attacker to execute code on the effected system with root privileges.
History

No history.

Subscriptions

Pritunl Pritunl-client-electron
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T15:49:06.677Z

Reserved: 2020-09-24T00:00:00.000Z

Link: CVE-2020-25989

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-19T21:15:12.200

Modified: 2024-11-21T05:19:02.490

Link: CVE-2020-25989

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses