First published: Tue Feb 05 2019(Updated: )
Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5 allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. In January 2018, attackers actively exploited this vulnerability in the wild.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kaseya Virtual System Administrator | >=9.3<9.3.0.35 | |
Kaseya Virtual System Administrator | >=9.4<9.4.0.36 | |
Kaseya Virtual System Administrator | >=9.5<9.5.0.5 | |
Kaseya Virtual System/Server Administrator (VSA) | ||
>=9.3<9.3.0.35 | ||
>=9.4<9.4.0.36 | ||
>=9.5<9.5.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20753 has been assigned a high severity rating due to its potential for remote code execution.
To mitigate CVE-2018-20753, upgrade Kaseya VSA to a version higher than 9.3.0.35, 9.4.0.36, or 9.5.0.5.
CVE-2018-20753 affects Kaseya VSA versions prior to 9.3.0.35, 9.4.0.36, and 9.5.0.5.
Yes, CVE-2018-20753 allows unprivileged remote attackers to execute PowerShell payloads on all managed devices.
Yes, there were active exploits for CVE-2018-20753 reported in the wild in January 2018.