First published: Mon Feb 17 2020(Updated: )
Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.33, 8.x before 8.0.0.23, 9.0 before 9.0.0.19, and 9.1 before 9.1.0.9 does not properly require authentication, which allows remote attackers to bypass authentication and (1) add an administrative account via crafted request to LocalAuth/setAccount.aspx or (2) write to and execute arbitrary files via a full pathname in the PathData parameter to ConfigTab/uploader.aspx.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kaseya Virtual System Administrator | >=7.0.0.0<7.0.0.33 | |
Kaseya Virtual System Administrator | >=8.0.0.0<8.0.0.23 | |
Kaseya Virtual System Administrator | >=9.0.0.0<9.0.0.19 | |
Kaseya Virtual System Administrator | >=9.1.0.0<9.1.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6922 has a high severity rating due to its potential for unauthorized access and privilege escalation.
To fix CVE-2015-6922, upgrade Kaseya VSA to versions 7.0.0.33, 8.0.0.23, 9.0.0.19, or 9.1.0.9 or later.
CVE-2015-6922 affects Kaseya Virtual System Administrator versions prior to 7.0.0.33, 8.0.0.23, 9.0.0.19, and 9.1.0.9.
CVE-2015-6922 can facilitate remote attackers bypassing authentication to add unauthorized administrative accounts.
Yes, there are known exploits for CVE-2015-6922 that take advantage of the authentication bypass vulnerability.