Vulnerability Details : CVE-2019-17202
FastTrack Admin By Request 6.1.0.0 supports group policies that are supposed to allow only a select range of users to elevate to Administrator privilege at will. If a user does not have direct access to the elevation feature through group policies, they are prompted to enter a PIN code in a challenge-response manner upon attempting to elevate privileges. The challenge's response uses a simple algorithm that can be easily emulated via data (customer ID and device name) available to all users, and thus any user can elevate to Administrator privilege.
Products affected by CVE-2019-17202
- cpe:2.3:a:fasttracksoftware:admin_by_request:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-17202
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 33 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-17202
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
8.2
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N |
1.8
|
5.8
|
MITRE | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2019-17202
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-17202
-
https://www.adminbyrequest.com/en/releasenotes
Release Notes » Admin By Request
-
https://improsec.com/en/responsible-disclosure
Responsible Disclosure — Improsec | improving securityThird Party Advisory
Jump to