Elevation of Privilege
This document lists out and explains the privilege-elevation vulnerabilities that have been reported.
Serial No. |
Vulnerabilities |
Fix Released on |
Reported by |
1 |
CVE-2019-12133 |
30-April-2019 |
Hashim Jawad from ACTIVELabs |
2 |
CVE-2018-13411, CVE-2018-13412 |
23-Aug-2018 |
Abdullah AlJaber |
3 |
CVE-2018-12999 |
26-July-2018 |
DBAppSecurity |
4 |
CVE-2018-5339 and CVE-2018-5340 |
24-April-2018 |
NCC Group Security Advisory |
5 |
CVE-2018-5337, CVE-2018-5338, CVE-2018-5341 |
27-March-2018 |
NCC Group Security Advisory |
What was the problem?
- Improper permissions of C:\ManageEngine directory which allowed non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM.
- Unauthorised users whose computer is installed with Endpoint Central Agent were able to access command prompt with SYSTEM privilege.
- Unauthenticated users were able to delete files from Endpoint Central server machine.
- Unauthorised users were able to execute queries to alter entries in database.
- Unauthenticated users were able to:
- Execute queries (Query type restriction by-pass) on Endpoint Central Server.
- Execute any web executable throughout the network using directory traversal or file type restriction by-pass.
How do I fix it?
These vulnerabilities have been identified and fixed. To apply the fix, follow the steps mentioned below:
- Log in to your Endpoint Central console, click on your current build number on the top right corner.
- You can find the latest build applicable to you. Download the PPM and update.
Keywords: Query Execution, Security Updates, Vulnerabilities and Fixes.