Vulnerability Details : CVE-2019-14510
Potential exploit
An issue was discovered in Kaseya VSA RMM through 9.5.0.22. When using the default configuration, the LAN Cache feature creates a local account FSAdminxxxxxxxxx (e.g., FSAdmin123456789) on the server that hosts the LAN Cache and all clients that are assigned to a LAN Cache. This account is placed into the local Administrators group of all clients assigned to the LAN Cache. When the assigned client is a Domain Controller, the FSAdminxxxxxxxxx account is created as a domain account and automatically added as a member of the domain BUILTIN\Administrators group. Using the well known Pass-the-Hash techniques, an attacker can use the same FSAdminxxxxxxxxx hash from any LAN Cache client and pass this to a Domain Controller, providing administrative rights to the attacker on any Domain Controller. (Local account Pass-the-Hash mitigations do not protect domain accounts.)
Vulnerability category: BypassGain privilege
Products affected by CVE-2019-14510
- cpe:2.3:a:kaseya:vsa:*:*:*:*:rmm:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-14510
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 55 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-14510
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
6.7
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.8
|
5.9
|
NIST |
CWE ids for CVE-2019-14510
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by: nvd@nist.gov (Primary)
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-14510
-
https://lockstepgroup.com/blog/cve-2019-14510-abusing-the-kaseya-lan-cache-fsadmin-red-team-edition/
CVE-2019-14510 - Abusing the Kaseya LAN Cache FSAdmin - Red Team Edition | Lockstep Technology GroupExploit;Third Party Advisory
-
https://www.kaseya.com/products/vsa/
RMM Software - Remote Monitoring and Management | Kaseya VSAProduct
-
https://lockstepgroup.com/blog/abusing-the-kaseya-lan-cache-fsadmin/
CVE-2019-14510 - Abusing the Kaseya LAN Cache FSAdmin - Blue Team Edition | Lockstep Technology GroupExploit;Third Party Advisory
-
http://community.kaseya.com/xsp/f/355.aspx
Kaseya CommunityRelease Notes
-
http://community.kaseya.com/xsp/f/355/t/24675.aspx
Kaseya CommunityRelease Notes
Jump to