Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-15351

EPSS 0.03% · P8
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-15351

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
IDrive before 6.7.3.19 on Windows installs by default to %PROGRAMFILES(X86)%\IDriveWindows with weak folder permissions granting any user modify permission (i.e., NT AUTHORITY\Authenticated Users:(OI)(CI)(M)) to the contents of the directory and its sub-folders. In addition, the program installs a service called IDriveService that runs as LocalSystem. Thus, any standard user can escalate privileges to NT AUTHORITY\SYSTEM by substituting the service's binary with a malicious one.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
IDrive 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
IDrive是美国IDrive公司的一套云备份和云存储服务解决方案。 IDrive 6.7.3.19之前版本(Windows)中存在安全漏洞。攻击者可利用该漏洞修改目录和子文件夹的内容,并可能将权限提升至NT AUTHORITYSYSTEM。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-15351

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-15351

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-06-26 · 37 CVEs total

CVE-2020-15334Zyxel CloudCNM SecuManager 安全漏洞
CVE-2020-15342Zyxel CloudCNM SecuManager 安全漏洞
CVE-2020-15341Zyxel CloudCNM SecuManager 安全漏洞
CVE-2020-15340Zyxel CloudCNM SecuManager 安全漏洞
CVE-2020-15339Zyxel CloudCNM SecuManager 跨站脚本漏洞
CVE-2020-15338Zyxel CloudCNM SecuManager 安全漏洞
CVE-2020-15337Zyxel CloudCNM SecuManager 安全漏洞
CVE-2020-15336ZyXEL CloudCNM SecuManager 访问控制错误漏洞
CVE-2020-15335ZyXEL CloudCNM SecuManager 访问控制错误漏洞
CVE-2020-15343Zyxel CloudCNM SecuManager 安全漏洞
CVE-2020-15333Zyxel CloudCNM SecuManager SQL注入漏洞
CVE-2020-15332Zyxel CloudCNM SecuManager 安全漏洞
CVE-2020-10769Linux kernel 缓冲区错误漏洞
CVE-2020-10628Honeywell ControlEdge PLC和ControlEdge RTU 安全漏洞
CVE-2020-13891Mattermost Mobile Apps 信息泄露漏洞
CVE-2020-10624Honeywell ControlEdge PLC和ControlEdge RTU 安全漏洞
CVE-2020-14955Jiangmin Antivirus 资源管理错误漏洞
CVE-2013-7489Beaker library 代码问题漏洞
CVE-2020-15329Zyxel CloudCNM SecuManager 安全漏洞
CVE-2020-15305Industrial Light and Magic OpenEXR 资源管理错误漏洞

Showing top 20 of 37 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-15351

No comments yet


Leave a comment