An local privilege escalation vulnerability due to a "runasroot" command in eScan Anti-Virus. This vulnerability is due to invalid arguments and insufficient execution conditions related to "runasroot" command. This vulnerability can induce remote attackers to exploit root privileges by manipulating parameter values.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66596 | Third Party Advisory | 
| https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66596 | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:56
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66596 - Third Party Advisory | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 10.0
         v3 : 7.8  | 
09 Apr 2022, 00:42
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:escanav:escan_anti-virus:*:*:*:*:*:linux:*:* | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 10.0
         v3 : 8.8  | 
| CWE | CWE-20 | |
| References | (MISC) https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66596 - Third Party Advisory | 
01 Apr 2022, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2022-04-01 23:15
Updated : 2024-11-21 05:56
NVD link : CVE-2021-26624
Mitre link : CVE-2021-26624
CVE.ORG link : CVE-2021-26624
JSON object : View
Products Affected
                escanav
- escan_anti-virus
 
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
