René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

209 lines
7.1 KiB
JSON

{
"id": "CVE-2018-19592",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-09-27T16:15:10.437",
"lastModified": "2019-10-01T18:46:27.467",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The \"CLink4Service\" service is installed with Corsair Link 4.9.7.35 with insecure permissions by default. This allows unprivileged users to take control of the service and execute commands in the context of NT AUTHORITY\\SYSTEM, leading to total system takeover, a similar issue to CVE-2018-12441."
},
{
"lang": "es",
"value": "El servicio \"CLink4Service\" se instala con Corsair Link versi\u00f3n 4.9.7.35 con permisos no seguros por defecto. Esto permite a los usuarios no privilegiados tomar el control del servicio y ejecutar comandos en el contexto de NT AUTHORITY\\SYSTEM, conllevando a la toma de control total del sistema, un problema similar a CVE-2018-12441."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:corsair:link:4.9.7.35:*:*:*:*:*:*:*",
"matchCriteriaId": "6F82DCC7-425E-4813-850B-6B2ACBA559F9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:axi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "629C552D-40FA-43E8-B451-CA6553ADFD99"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:commander_mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDB78928-2F76-49AA-A1E8-AB28B11E2068"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:commander_pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5400177A-5815-4A46-929C-E2AB85C102CB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:h100i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB845B7-F994-416C-8D08-C44C00527981"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:h100i_gtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA5BEEF-8CE1-498E-B168-7A788F80F404"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:h100i_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7A59B2-7863-4F2C-9FB2-5E76F980EC2C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:h110i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F59ED6D7-0F54-4051-9F55-BDA4F3D2118C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:h110i_gt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73F12D4C-4EB7-42E3-AE6E-FEA3EE3199BE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:h110i_gtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA13D762-37D3-4494-8290-6D4994205F34"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:h115i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A453D0E-C1E6-4908-A220-C8270FD6736F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:h80i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B59A8FFB-A7B6-4C4C-99C1-A1D7C3F647CE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:h80i_gt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43927E49-32F8-4EED-B981-EF07EE810ED0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:h80i_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "080C2B1A-17F2-4E15-BE8E-B168979A36DF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:hxi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1FAC76-E660-465F-87ED-299834258BD7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:lighting_node_pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "460577E1-44C0-4CF7-911C-1D0CBB5C1AF2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:rm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "055CF7CF-C5CE-41D3-8409-A6AAEE9C121E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:rmi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A77E865-0F08-4063-BFF5-B756E2680138"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:corsair:x99:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B0FA2B4-9454-49E1-8F69-9302883A2846"
}
]
}
]
}
],
"references": [
{
"url": "http://forum.corsair.com/v3/showthread.php?t=155646",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://github.com/BradyDonovan/CVE-2018-19592/blob/master/CLink4Service",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}