First published: Fri Dec 06 2019(Updated: )
In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a file. This is limited in scope to the collection of process-execution telemetry, for executions against specific files where the SYSTEM user was denied access to the source file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dell Red Cloak Windows Agent | <2.0.7.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19620 is classified as a local privilege escalation vulnerability.
To fix CVE-2019-19620, update the SecureWorks Red Cloak Windows Agent to version 2.0.7.9 or later.
CVE-2019-19620 affects local users with access to the SecureWorks Red Cloak Windows Agent versions prior to 2.0.7.9.
The impact of CVE-2019-19620 is that a local user can bypass telemetry alerts for process execution.
There is no official workaround for CVE-2019-19620; the recommended action is to update to a secure version.