ActFax Version 7.10 Build 0335 (2020-05-25) is susceptible to a privilege escalation vulnerability due to insecure folder permissions on %PROGRAMFILES%\ActiveFax\Client\, %PROGRAMFILES%\ActiveFax\Install\ and %PROGRAMFILES%\ActiveFax\Terminal\. The folder permissions allow "Full Control" to "Everyone". An authenticated local attacker can exploit this to replace the TSClientB.exe binary in the Terminal directory, which is executed on logon for every user. Alternatively, the attacker can replace any of the binaries in the Client or Install directories. The latter requires additional user interaction, for example starting the client.
                
            References
                    | Link | Resource | 
|---|---|
| https://blog.to.com/advisory-actfax-7-10-build-0335-privilege-escalation-cve-2020-15843/ | Exploit Third Party Advisory | 
| https://blog.to.com/advisory-actfax-7-10-build-0335-privilege-escalation-cve-2020-15843/ | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:06
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://blog.to.com/advisory-actfax-7-10-build-0335-privilege-escalation-cve-2020-15843/ - Exploit, Third Party Advisory | 
Information
                Published : 2020-09-24 23:15
Updated : 2024-11-21 05:06
NVD link : CVE-2020-15843
Mitre link : CVE-2020-15843
CVE.ORG link : CVE-2020-15843
JSON object : View
Products Affected
                actfax
- actfax
CWE
                
                    
                        
                        CWE-276
                        
            Incorrect Default Permissions
