{ "id": "CVE-2022-25294", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-10T17:47:07.150", "lastModified": "2024-11-21T06:51:56.603", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Proofpoint Insider Threat Management Agent for Windows relies on an inherently dangerous function that could enable an unprivileged local Windows user to run arbitrary code with SYSTEM privileges. All versions prior to 7.12.1 are affected. Agents for MacOS and Linux and Cloud are unaffected. Proofpoint has released fixed software version 7.12.1. The fixed software versions are available through the customer support portal." }, { "lang": "es", "value": "Proofpoint Insider Threat Management Agent para Windows es basado en una funci\u00f3n inherentemente peligrosa que podr\u00eda permitir a un usuario local de Windows no privilegiado ejecutar c\u00f3digo arbitrario con privilegios SYSTEM. Todas las versiones anteriores a 7.12.1 est\u00e1n afectadas. Los agentes para MacOS y Linux y Cloud no est\u00e1n afectados. Proofpoint ha publicado la versi\u00f3n de software corregida 7.12.1. Las versiones de software corregidas est\u00e1n disponibles mediante el portal de soporte al cliente" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:proofpoint:insider_threat_management:*:*:*:*:*:windows:*:*", "versionEndExcluding": "7.12.1", "matchCriteriaId": "0A7095F6-192A-4D1D-9ABC-1403713FFC4D" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } ] } ], "references": [ { "url": "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2022-0001", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2022-0001", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }