CVE-2019-17202

FastTrack Admin By Request 6.1.0.0 supports group policies that are supposed to allow only a select range of users to elevate to Administrator privilege at will. If a user does not have direct access to the elevation feature through group policies, they are prompted to enter a PIN code in a challenge-response manner upon attempting to elevate privileges. The challenge's response uses a simple algorithm that can be easily emulated via data (customer ID and device name) available to all users, and thus any user can elevate to Administrator privilege.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fasttracksoftware:admin_by_request:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:31

Type Values Removed Values Added
References () https://improsec.com/en/responsible-disclosure - Third Party Advisory () https://improsec.com/en/responsible-disclosure - Third Party Advisory
References () https://www.adminbyrequest.com/en/releasenotes - () https://www.adminbyrequest.com/en/releasenotes -

25 May 2023, 17:15

Type Values Removed Values Added
CPE cpe:2.3:a:fasttracksoftware:admin_by_request:6.1.0.0:*:*:*:*:*:*:* cpe:2.3:a:fasttracksoftware:admin_by_request:*:*:*:*:*:*:*:*
References
  • (CONFIRM) https://www.adminbyrequest.com/en/releasenotes -

Information

Published : 2020-01-23 15:15

Updated : 2024-11-21 04:31


NVD link : CVE-2019-17202

Mitre link : CVE-2019-17202

CVE.ORG link : CVE-2019-17202


JSON object : View

Products Affected

fasttracksoftware

  • admin_by_request
CWE
CWE-269

Improper Privilege Management