Vulnerability Details : CVE-2018-15590
An issue was discovered in Ivanti Workspace Control before 10.3.0.0 and RES One Workspace, when file and folder security are configured. A local authenticated user can bypass file and folder security restriction by leveraging an unspecified attack vector.
Products affected by CVE-2018-15590
- cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-15590
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 23 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-15590
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
References for CVE-2018-15590
-
https://seclists.org/bugtraq/2018/Oct/10
Bugtraq: Ivanti Workspace Control Data Security bypass via localhost UNC pathMailing List;Third Party Advisory
-
https://community.ivanti.com/docs/DOC-69682
Vendor Advisory
-
https://www.securify.nl/en/advisory/SFY20180803/ivanti-workspace-control-data-security-bypass-via-localhost-unc-path.html
Ivanti Workspace Control Data Security bypass via localhost UNC path - Security Advisories and Insights - Securify B.V.Third Party Advisory
-
http://packetstormsecurity.com/files/149617/Ivanti-Workspace-Control-UNC-Path-Data-Security-Bypass.html
Ivanti Workspace Control UNC Path Data Security Bypass ≈ Packet StormThird Party Advisory;VDB Entry
-
http://seclists.org/fulldisclosure/2018/Oct/2
Full Disclosure: Ivanti Workspace Control Data Security bypass via localhost UNC pathMailing List;Third Party Advisory
Jump to