First published: Mon Dec 02 2019(Updated: )
Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud prior to version 2020 patch E have bug that allows a local user to execute arbitrary code via execution compromised file placed by an attacker with administrator rights. No privilege escalation. Possible whitelisting bypass some of the security products
Credit: vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kaspersky Internet Security 2010 | =2019 | |
Kaspersky Internet Security 2010 | =2019-patch_f | |
Kaspersky Internet Security 2010 | =2019-patch_i | |
Kaspersky Internet Security 2010 | =2019-patch_j | |
Kaspersky VPN Secure Connection | =3.0 | |
Kaspersky VPN Secure Connection | =4.0 | |
Kaspersky Security Cloud | =2019 | |
Kaspersky Security Cloud | =2019-patch_i | |
Kaspersky Security Cloud | =2019-patch_j | |
Kaspersky Security Cloud | =2020 | |
Kaspersky Total Security 2015 | =2019 | |
Kaspersky Total Security 2015 | =2019-patch_f | |
Kaspersky Total Security 2015 | =2019-patch_i | |
Kaspersky Total Security 2015 | =2019-patch_j | |
Kaspersky Total Security 2015 | =2020 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15689 has a medium severity rating due to the potential for local users to execute arbitrary code.
To fix CVE-2019-15689, update your Kaspersky software to the latest version or patch provided by Kaspersky.
CVE-2019-15689 affects Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, and Kaspersky Security Cloud prior to version 2020 patch E.
CVE-2019-15689 enables local users with administrator rights to execute arbitrary code through compromised files.
There is no official workaround for CVE-2019-15689; the best solution is to apply the available software updates.