SB2020040904 - Multiple vulnerabilities in Palo Alto Secdo for Windows
Published: April 9, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) External Control of File Name or Path (CVE-ID: CVE-2020-1984)
The vulnerability allows a local user to escalate privileges on the target system.
Thevulnerability exists due to the affected software tries to execute a script at a hardcoded path if present. A local user with "create folders or append data" access to the root of the OS disk (C:\) can gain system privileges if the path does not already exist or is writable.
2) Incorrect default permissions (CVE-ID: CVE-2020-1985)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions on "C:\Programdata\Secdo\Logs" folder. A local user can overwrite system files and gain elevated privileges on the target system.
3) Input validation error (CVE-ID: CVE-2020-1986)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A local user with "create folders or append data" access to the root of the OS disk (C:\) can cause a system crash on every login.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.