First published: Tue Nov 23 2021(Updated: )
A component in Kaspersky Password Manager could allow an attacker to elevate a process Integrity level from Medium to High.
Credit: vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kaspersky Password Manager | <=9.0.1 | |
Kaspersky Password Manager | =9.0.2 | |
Kaspersky Password Manager | =9.0.2-patch_a | |
Kaspersky Password Manager | =9.0.2-patch_b | |
Kaspersky Password Manager | =9.0.2-patch_c | |
Kaspersky Password Manager | =9.0.2-patch_d | |
Kaspersky Password Manager | =9.0.2-patch_e | |
Kaspersky Password Manager | =9.0.2-patch_f | |
Kaspersky Password Manager | =9.0.2-patch_g | |
Kaspersky Password Manager | =9.0.2-patch_h | |
Kaspersky Password Manager | =9.0.2-patch_i | |
Kaspersky Password Manager | =9.0.2-patch_j | |
Kaspersky Password Manager | =9.0.2-patch_k | |
Kaspersky Password Manager | =9.0.2-patch_l | |
Kaspersky Password Manager | =9.0.2-patch_m | |
Kaspersky Password Manager | =9.0.2-patch_n | |
Kaspersky Password Manager | =9.0.2-patch_o | |
Kaspersky Password Manager | =9.0.2-patch_p | |
Kaspersky Password Manager | =9.0.2-patch_q | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35052 is a vulnerability in Kaspersky Password Manager that allows local attackers to escalate privileges.
Users of Kaspersky Password Manager versions 9.0.1 and 9.0.2 are affected by CVE-2021-35052.
CVE-2021-35052 has a severity rating of 7.8 (high).
An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit CVE-2021-35052.
Yes, users should update to the latest version of Kaspersky Password Manager to fix CVE-2021-35052.