Filtered by vendor Beyondtrust
Subscribe
Total
30 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-12612 | 1 Beyondtrust | 1 Privilege Management For Windows | 2023-12-15 | N/A | 7.8 HIGH |
An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. When specifying a program to elevate, it can typically be found within the Program Files (x86) folder and therefore uses the %ProgramFiles(x86)% environment variable. However, when this same policy gets pushed to a 32bit machine, this environment variable does not exist. Therefore, since the standard user can create a user level environment variable, they can repoint this variable to any folder the user has full control of. Then, the folder structure can be created in such a way that a rule matches and arbitrary code runs elevated. | |||||
CVE-2020-28369 | 1 Beyondtrust | 1 Privilege Management For Windows | 2023-12-14 | N/A | 7.8 HIGH |
In BeyondTrust Privilege Management for Windows (aka PMfW) through 5.7, a SYSTEM installation causes Cryptbase.dll to be loaded from the user-writable location %WINDIR%\Temp. | |||||
CVE-2020-12613 | 1 Beyondtrust | 1 Privilege Management For Windows | 2023-12-14 | N/A | 8.8 HIGH |
An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. An attacker can spawn a process with multiple users as part of the security token (prior to Avecto elevation). When Avecto elevates the process, it removes the user who is launching the process, but not the second user. Therefore this second user still retains access and can give permission to the process back to the first user. | |||||
CVE-2023-4310 | 1 Beyondtrust | 2 Privileged Remote Access, Remote Support | 2023-11-07 | N/A | 9.8 CRITICAL |
BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) versions 23.2.1 and 23.2.2 contain a command injection vulnerability which can be exploited through a malicious HTTP request. Successful exploitation of this vulnerability can allow an unauthenticated remote attacker to execute underlying operating system commands within the context of the site user. This issue is fixed in version 23.2.3. | |||||
CVE-2023-23632 | 1 Beyondtrust | 1 Privileged Remote Access | 2023-10-18 | N/A | 7.8 HIGH |
BeyondTrust Privileged Remote Access (PRA) versions 22.2.x to 22.4.x are vulnerable to a local authentication bypass. Attackers can exploit a flawed secret verification process in the BYOT shell jump sessions, allowing unauthorized access to jump items by guessing only the first character of the secret. | |||||
CVE-2021-31589 | 1 Beyondtrust | 1 Appliance Base Software | 2022-02-07 | 4.3 MEDIUM | 6.1 MEDIUM |
A cross-site scripting (XSS) vulnerability has been reported and confirmed for BeyondTrust Secure Remote Access Base Software version 6.0.1 and older, which allows the injection of unauthenticated, specially-crafted web requests without proper sanitization. | |||||
CVE-2021-42254 | 1 Beyondtrust | 1 Privilege Management For Windows | 2021-11-24 | 7.2 HIGH | 7.8 HIGH |
BeyondTrust Privilege Management prior to version 21.6 creates a Temporary File in a Directory with Insecure Permissions. | |||||
CVE-2020-9326 | 1 Beyondtrust | 1 Privilege Management For Windows And Mac | 2021-07-21 | 5.0 MEDIUM | 7.5 HIGH |
BeyondTrust Privilege Management for Windows and Mac (aka PMWM; formerly Avecto Defendpoint) 5.1 through 5.5 before 5.5 SR1 mishandles command-line arguments with PowerShell .ps1 file extensions present, leading to a DefendpointService.exe crash. | |||||
CVE-2018-10959 | 1 Beyondtrust | 1 Avecto Defendpoint | 2020-12-28 | 5.0 MEDIUM | 7.5 HIGH |
Avecto Defendpoint 4 prior to 4.4 SR6 and 5 prior to 5.1 SR1 has an Untrusted Search Path vulnerability, exploitable by modifying environment variables to trigger automatic elevation of an attacker's process launch. | |||||
CVE-2017-5996 | 1 Beyondtrust | 1 Remote Support | 2019-11-18 | 9.3 HIGH | 7.8 HIGH |
The agent in Bomgar Remote Support 15.2.x before 15.2.3, 16.1.x before 16.1.5, and 16.2.x before 16.2.4 allows DLL hijacking because of weak %SYSTEMDRIVE%\ProgramData permissions. |