Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:teradici:graphics_agent:*:*:*:*:*:windows:*:*", "matchCriteriaId": "14D4B030-1438-47EC-AA0A-1E74CFFA34E3", "versionEndExcluding": "20.04.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:teradici:pcoip_standard_agent:*:*:*:*:*:windows:*:*", "matchCriteriaId": "C746FBCC-92C4-40BA-9C88-0C9FD3494932", "versionEndExcluding": "20.04.1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "The support bundler in Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows versions prior to 20.04.1 and 20.07.0 does not use hard coded paths for certain Windows binaries, which allows an attacker to gain elevated privileges via execution of a malicious binary placed in the system path."}, {"lang": "es", "value": "El paquete de soporte en Teradici PCoIP Standard Agent para Windows y Graphics Agent para Windows versiones anteriores a 20.04.1 y 20.07.0, no usa rutas embebidas para determinados binarios de Windows, lo que permite a un atacante alcanzar privilegios elevados mediante una ejecuci\u00f3n de un binario malicioso colocado en la ruta del sistema"}], "id": "CVE-2020-13177", "lastModified": "2024-11-21T05:00:48.640", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-08-11T18:15:12.677", "references": [{"source": "security@teradici.com", "tags": ["Patch", "Vendor Advisory"], "url": "https://advisory.teradici.com/security-advisories/60/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "https://advisory.teradici.com/security-advisories/60/"}], "sourceIdentifier": "security@teradici.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-427"}], "source": "security@teradici.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-427"}], "source": "nvd@nist.gov", "type": "Primary"}]}