First published: Wed Dec 22 2021(Updated: )
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech R-SeeNet | =2.4.15 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the privilege escalation vulnerability in Advantech R-SeeNet is CVE-2021-21910.
The affected software version of the privilege escalation vulnerability in Advantech R-SeeNet is 2.4.15.
The severity of the privilege escalation vulnerability in Advantech R-SeeNet is high with a CVSS score of 7.8.
The privilege escalation vulnerability in Advantech R-SeeNet can be exploited by providing a specially-crafted file to escalate privileges to NT SYSTEM authority.
At the time of writing, there is no information available about a patch to fix the privilege escalation vulnerability in Advantech R-SeeNet. It is recommended to follow the vendor's advisories for updates and mitigations.