Show plain JSON{"id": "CVE-2020-8884", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2021-01-06T14:15:13.920", "references": [{"url": "https://www.proofpoint.com/us/blog", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2020-0002", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.proofpoint.com/us/blog", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2020-0002", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-502"}]}], "descriptions": [{"lang": "en", "value": "rcdsvc in the Proofpoint Insider Threat Management Windows Agent (formerly ObserveIT Windows Agent) before 7.9 allows remote authenticated users to execute arbitrary code as SYSTEM because of improper deserialization over named pipes."}, {"lang": "es", "value": "rcdsvc en el Proofpoint Insider Threat Management Windows Agent (anteriormente ObserveIT Windows Agent) versiones anteriores a 7.9, permite a los usuarios autenticados remotamente ejecutar c\u00f3digo arbitrario como SYSTEM debido a una deserializaci\u00f3n inapropiada sobre tuber\u00edas nombradas"}], "lastModified": "2024-11-21T05:39:37.993", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:proofpoint:insider_threat_management:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "7555EFF6-7B9D-48EC-BCF4-A7F51769E1E4", "versionEndExcluding": "7.4.2", "versionStartIncluding": "6.3"}, {"criteria": "cpe:2.3:a:proofpoint:insider_threat_management:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "533604AC-2B70-4FE3-AE51-097EE611FD73", "versionEndExcluding": "7.5.3", "versionStartIncluding": "7.5.0"}, {"criteria": "cpe:2.3:a:proofpoint:insider_threat_management:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "EF744303-BBC8-4D9E-B11A-BFB33D071A04", "versionEndExcluding": "7.6.4", "versionStartIncluding": "7.6.0"}, {"criteria": "cpe:2.3:a:proofpoint:insider_threat_management:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "39B3E59B-3DED-4F01-8B0A-7DB79585FBC5", "versionEndExcluding": "7.7.4", "versionStartIncluding": "7.7.0"}, {"criteria": "cpe:2.3:a:proofpoint:insider_threat_management:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "EFEABC1C-8420-444E-99FD-2390D0E0ABF6", "versionEndExcluding": "7.8.3", "versionStartIncluding": "7.8.0"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}