First published: Tue Sep 24 2019(Updated: )
In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\ used by ccschedulersvc.exe allows local attackers to hijack dotnetproxy.exe, which leads to privilege escalation when the ccSchedulerSVC service runs the executable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TotalDefense AntiVirus | =9.0.0.773 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13355 is classified as a high-severity vulnerability due to its potential for privilege escalation.
To mitigate CVE-2019-13355, ensure proper access controls are applied to the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\.
CVE-2019-13355 primarily affects users of Total Defense Anti-virus version 9.0.0.773.
CVE-2019-13355 can be exploited by local attackers taking advantage of insecure access controls.
Attackers can hijack dotnetproxy.exe to achieve privilege escalation when the ccSchedulerSVC service executes the compromised executable.