First published: Thu Sep 26 2019(Updated: )
The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from command injection vulnerability. Local users can use this vulnerability to execute code with NT\SYSTEM privilege.
Credit: cert@airbus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netskope | >=57<57.2.0.219 | |
Netskope | >=60<60.2.0.214 |
Remediations were applied in R62 onwards and retrospectively applied in golden releases R60.2.0.214 and R57.2.0.219. Link to latest support golden releases - https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12091 is a vulnerability in the Netskope client service that allows local users to execute arbitrary commands with NT\SYSTEM privilege.
CVE-2019-12091 has a severity rating of 7.8 (high).
CVE-2019-12091 affects Netskope client service versions 57 before 57.2.0.219 and versions 60 before 60.2.0.214.
Local users can exploit CVE-2019-12091 to execute arbitrary commands by leveraging the command injection vulnerability in the Netskope client service.
You can find more information about CVE-2019-12091 in the following references: [1] [2] [3]