Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:absolute:ctes_windows_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "93F555B4-F541-4AA0-BAAD-A52394B57088", "versionEndIncluding": "1.0.0.1479", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in Absolute Software CTES Windows Agent through 1.0.0.1479. The security permissions on the %ProgramData%\\CTES folder and sub-folders may allow write access to low-privileged user accounts. This allows unauthorized replacement of service program executable (EXE) or dynamically loadable library (DLL) files, causing elevated (SYSTEM) user access. Configuration control files or data files under this folder could also be similarly modified to affect service process behavior."}, {"lang": "es", "value": "Se ha descubierto un problema hasta la versi\u00f3n 1.0.0.1479 de Absolute Software CTES Windows Agent. Los permisos de seguridad en la carpeta y las carpetas %ProgramData%\\CTES podr\u00eda permitir el acceso de escritura a cuentas de usuario con pocos privilegios. Esto permite el reemplazo no autorizado de un EXE del programa de servicio o de archivos DLL (dynamically loadable library), lo que provoca el acceso de usuario elevado (SYSTEM). Los archivos de control de configuraci\u00f3n o de datos en esta carpeta tambi\u00e9n podr\u00edan modificarse para afectar al comportamiento del proceso del servicio."}], "id": "CVE-2018-16715", "lastModified": "2024-11-21T03:53:12.767", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-09-08T10:29:01.087", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://community.absolute.com/s/article/Absolute-Security-Bulletin-ASB1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://community.absolute.com/s/article/Absolute-Security-Bulletin-ASB1"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-732"}], "source": "nvd@nist.gov", "type": "Primary"}]}