** DISPUTED ** An issue in mRemoteNG v1.76.20 allows attackers to escalate privileges via a crafted executable file. NOTE: third parties were unable to reproduce any scenario in which the claimed access of BUILTIN\Users:(M) is present.
References
Configurations
History
17 Feb 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary | ** DISPUTED ** An issue in mRemoteNG v1.76.20 allows attackers to escalate privileges via a crafted executable file. NOTE: third parties were unable to reproduce any scenario in which the claimed access of BUILTIN\Users:(M) is present. | |
CPE | cpe:2.3:a:mremoteng:mremoteng:1.76.20:*:*:*:*:*:*:* | |
CWE | CWE-269 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References |
|
|
References | (MISC) https://packetstormsecurity.com/files/170794/mRemoteNG-1.76.20-Privilege-Escalation.html - Third Party Advisory, VDB Entry | |
References | (MISC) https://github.com/NyaMeeEain/Infrastructure-Assessment/blob/master/Privilege%20Escalation/Common%20Windows%20Privilege%20Escalation.md - Not Applicable |
02 Feb 2023, 13:56
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-02 12:15
Updated : 2024-08-04 15:16
NVD link : CVE-2020-24307
Mitre link : CVE-2020-24307
CVE.ORG link : CVE-2020-24307
JSON object : View
Products Affected
mremoteng
- mremoteng
CWE
CWE-269
Improper Privilege Management