Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:k7computing:k7_antivirus_premium:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C6C26B8-22BD-43B7-8996-506C8D1CF5DA", "versionEndIncluding": "16.0.0120", "versionStartIncluding": "16.0.000", "vulnerable": true}, {"criteria": "cpe:2.3:a:k7computing:k7_total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE1EAF62-2BD7-460B-BF4B-7A91425E5CA6", "versionEndIncluding": "16.0.0120", "versionStartIncluding": "16.0.000", "vulnerable": true}, {"criteria": "cpe:2.3:a:k7computing:k7_ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "A70AE95A-6D0E-49B5-B1EE-AFE01EE55418", "versionEndIncluding": "16.0.0120", "versionStartIncluding": "16.0.000", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "In K7 Antivirus Premium 16.0.xxx through 16.0.0120; K7 Total Security 16.0.xxx through 16.0.0120; and K7 Ultimate Security 16.0.xxx through 16.0.0120, the module K7TSHlpr.dll improperly validates the administrative privileges of the user, allowing arbitrary registry writes in the K7AVOptn.dll module to facilitate escalation of privileges via inter-process communication with a service process."}, {"lang": "es", "value": "En K7 Antivirus Premium versiones 16.0.xxx hasta 16.0.0120; K7 Total Security versiones 16.0.xxx hasta 16.0.0120; y K7 Ultimate Security versiones 16.0.xxx hasta 16.0.0120, el m\u00f3dulo K7TSHlpr.dll comprueba inapropiadamente los privilegios administrativos del usuario, permitiendo escrituras de registro arbitrarias en el m\u00f3dulo K7AVOptn.dll para facilitar la escalada de privilegios por medio de la comunicaci\u00f3n entre procesos con un proceso de servicio ."}], "id": "CVE-2019-16897", "lastModified": "2024-11-21T04:31:17.880", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-10-28T15:15:14.020", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/K7%20Security/Local%20Privilege%20Escalation/v16.0.0120/README.md"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/K7%20Security/Local%20Privilege%20Escalation/v16.0.0120/README.md"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-269"}], "source": "nvd@nist.gov", "type": "Primary"}]}