First published: Fri Jan 20 2023(Updated: )
Cybereason EDR version 19.1.282 and above, 19.2.182 and above, 20.1.343 and above, and 20.2.X and above has a DLL hijacking vulnerability, which could allow a local attacker to execute code with elevated privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cybereason Endpoint Detection And Response | <19.1.282 | |
Cybereason Endpoint Detection And Response | >=19.2.0<19.2.182 | |
Cybereason Endpoint Detection And Response | >=20.1.0<20.1.343 | |
Cybereason Endpoint Detection And Response | =20.2.0 | |
<19.1.282 | ||
>=19.2.0<19.2.182 | ||
>=20.1.0<20.1.343 | ||
=20.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25502 has a high severity rating due to its potential to allow local attackers to execute code with elevated privileges.
To fix CVE-2020-25502, upgrade to Cybereason EDR version 20.2.1 or later, as this version mitigates the DLL hijacking vulnerability.
CVE-2020-25502 affects Cybereason EDR versions prior to 20.2.1, including 19.1.282, versions between 19.2.0 and 19.2.182, versions between 20.1.0 and 20.1.343, and version 20.2.0.
CVE-2020-25502 cannot be exploited remotely as it requires local access to the affected system.
CVE-2020-25502 allows an attacker with local access to run unauthorized code with elevated rights, potentially compromising system integrity.