Vulnerability Details : CVE-2014-7288
Symantec PGP Universal Server and Encryption Management Server before 3.3.2 MP7 allow remote authenticated administrators to execute arbitrary shell commands via a crafted command line in a database-backup restore action.
Products affected by CVE-2014-7288
- cpe:2.3:a:symantec:pgp_universal_server:*:mp6:*:*:*:*:*:*
- cpe:2.3:a:symantec:encryption_management_server:*:mp6:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-7288
10.48%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-7288
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST |
CWE ids for CVE-2014-7288
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-7288
-
http://www.securityfocus.com/bid/72308
Symantec Encryption Management Server CVE-2014-7288 Local Command Injection Vulnerability
-
http://www.securitytracker.com/id/1031673
Symantec Encryption Management Server Lets Local Users Gain Elevated Privileges and Remote Users Inject Email Headers - SecurityTracker
-
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150129_00
Symantec Encryption Management Server Database Backup Command Line Injection and Email Header InjectPatch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/100763
Symantec Encryption Management Server command execution CVE-2014-7288 Vulnerability Report
-
http://www.exploit-db.com/exploits/35949
Symantec Encryption Management Server < 3.2.0 MP6 - Remote Command Injection - Windows remote Exploit
Jump to