一、 漏洞 CVE-2016-9486 基础信息
漏洞标题
在Windows端点上,SecureConnector代理易受权限提升攻击,允许认证的无权限用户因文件在权限设置不正确的文件夹中创建而获得端点的管理员权限。
来源:AIGC 神龙大模型
漏洞描述信息
在Windows端点上,SecureConnector代理存在权限提升漏洞,授权的无权用户可以在端点上获取管理员权限,因为文件被创建在权限设置不正确的文件夹中。
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
来源:AIGC 神龙大模型
漏洞类别
N/A
来源:AIGC 神龙大模型
漏洞标题
On Windows endpoints, the SecureConnector agent is vulnerable to privilege escalation whereby an authenticated unprivileged user can obtain administrator privileges on the endpoint because files are created in a folder with incorrect privileges
来源:美国国家漏洞数据库 NVD
漏洞描述信息
On Windows endpoints, the SecureConnector agent must run under the local SYSTEM account or another administrator account in order to enable full functionality of the agent. The typical configuration is for the agent to run as a Windows service under the local SYSTEM account. The SecureConnector agent runs various plugin scripts and executables on the endpoint in order to gather and report information about the host to the CounterACT management appliance. The SecureConnector agent downloads these scripts and executables as needed from the CounterACT management appliance and runs them on the endpoint. By default, these executable files are downloaded to and run from the %TEMP% directory of the currently logged on user, despite the fact that the SecureConnector agent is running as SYSTEM. Aside from the downloaded scripts, the SecureConnector agent runs a batch file with SYSTEM privileges from the temp directory of the currently logged on user. If the naming convention of this script can be derived, which is made possible by placing it in a directory to which the user has read access, it may be possible overwrite the legitimate batch file with a malicious one before SecureConnector executes it. It is possible to change this directory by setting the the configuration property config.script_run_folder.value in the local.properties configuration file on the CounterACT management appliance, however the batch file which is run does not follow this property.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
在具有不安全权限的目录中创建临时文件
来源:美国国家漏洞数据库 NVD
漏洞标题
ForeScout CounterACT 权限许可和访问控制漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
ForeScout CounterACT是一款网络准入控制产品。 ForeScout CounterACT中存在安全漏洞,该漏洞源于程序以不安全的方式创建文件。攻击者可借助恶意的文件利用该漏洞覆盖合法的批处理文件并可能更改路径。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
权限许可和访问控制问题
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2016-9486 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2016-9486 的情报信息