Show plain JSON{"id": "CVE-2019-9486", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2019-04-30T19:29:04.640", "references": [{"url": "https://zer0-day.pw/articles/2019-04/HiDrive-LPE-via-Insecure-WCF-endpoint", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://zer0-day.pw/articles/2019-04/HiDrive-LPE-via-Insecure-WCF-endpoint", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-367"}]}], "descriptions": [{"lang": "en", "value": "STRATO HiDrive Desktop Client 5.0.1.0 for Windows suffers from a SYSTEM privilege escalation vulnerability through the HiDriveMaintenanceService service. This service establishes a NetNamedPipe endpoint that allows applications to connect and call publicly exposed methods. An attacker can inject and execute code by hijacking the insecure communications with the service. This vulnerability also affects Telekom MagentaCLOUD through 5.7.0.0 and 1&1 Online Storage through 6.1.0.0."}, {"lang": "es", "value": "STRATO HiDrive Desktop Client versi\u00f3n 5.0.1.0 para Windows sufre una vulnerabilidad de escalada de privilegios SYSTEM por medio del servicio HiDriveMaintenanceService. Este servicio establece un endpoint NetNamedPipe que permite a las aplicaciones conectarse y llamar a m\u00e9todos expuestos p\u00fablicamente. Un atacante puede inyectar y ejecutar un c\u00f3digo mediante el pirateo de comunicaciones no seguras con el servicio. Esta vulnerabilidad tambi\u00e9n afecta a Telekom MagentaCLOUD a trav\u00e9s de la versi\u00f3n 5.7.0.0 y 1&1 Online Storage a trav\u00e9s de la versi\u00f3n 6.1.0.0."}], "lastModified": "2024-11-21T04:51:42.827", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:strato:hidrive_desktop_client:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "873FAFDA-AE90-401C-8F12-06063D718DAD", "versionEndIncluding": "5.0.1.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:telekom:magentacloud:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54F64BE0-AD14-4BC2-9E61-EEBD1A294B6A", "versionEndIncluding": "5.7.0.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ionos:1\\&1_online_storage:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "119748FF-C42A-4A64-AB79-5A1E03EA2D08", "versionEndIncluding": "6.1.0.0"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}