Vulnerability Details : CVE-2019-9486
STRATO HiDrive Desktop Client 5.0.1.0 for Windows suffers from a SYSTEM privilege escalation vulnerability through the HiDriveMaintenanceService service. This service establishes a NetNamedPipe endpoint that allows applications to connect and call publicly exposed methods. An attacker can inject and execute code by hijacking the insecure communications with the service. This vulnerability also affects Telekom MagentaCLOUD through 5.7.0.0 and 1&1 Online Storage through 6.1.0.0.
Vulnerability category: Execute codeGain privilege
Products affected by CVE-2019-9486
- cpe:2.3:a:strato:hidrive_desktop_client:*:*:*:*:*:windows:*:*
- cpe:2.3:a:telekom:magentacloud:*:*:*:*:*:*:*:*
- cpe:2.3:a:ionos:1\&1_online_storage:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-9486
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 47 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-9486
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2019-9486
-
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-9486
-
https://zer0-day.pw/articles/2019-04/HiDrive-LPE-via-Insecure-WCF-endpoint
HiDrive: Local Privilege Escalation via Insecure WCF endpoint | 0day - core dumpExploit;Third Party Advisory
Jump to