First published: Wed Dec 22 2021(Updated: )
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech R-SeeNet | =2.4.15 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21912 is a privilege escalation vulnerability in the Windows version of installation for Advantech R-SeeNet.
CVE-2021-21912 has a severity score of 7.8 out of 10, indicating a high severity.
Advantech R-SeeNet version 2.4.15 installed on Windows systems is affected by CVE-2021-21912.
An attacker can exploit CVE-2021-21912 by providing a specially-crafted file to escalate privileges to NT SYSTEM authority on the affected system.
No, Microsoft Windows itself is not vulnerable to CVE-2021-21912.
Yes, you can find more information about CVE-2021-21912 at the following link: [CVE-2021-21912](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360).