Elevation of Privilege

This document lists out and explains the privilege-elevation vulnerabilities that have been reported.

Serial No.VulnerabilitiesFix Released onReported by
1CVE-2019-1213330-April-2019Hashim Jawad from ACTIVELabs
2CVE-2018-13411, CVE-2018-1341223-Aug-2018Abdullah AlJaber
3CVE-2018-1299926-July-2018DBAppSecurity
4CVE-2018-5339 and CVE-2018-534024-April-2018NCC Group Security Advisory
5CVE-2018-5337, CVE-2018-5338, CVE-2018-534127-March-2018NCC Group Security Advisory

 

What was the problem?

  1. Improper permissions of C:\ManageEngine directory which allowed non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM.
  2. Unauthorised users whose computer is installed with Endpoint Central Agent were able to access command prompt with SYSTEM privilege.
  3. Unauthenticated users were able to delete files from Endpoint Central server machine.
  4. Unauthorised users were able to execute queries to alter entries in database.
  5. Unauthenticated users were able to:
    • Execute queries (Query type restriction by-pass) on Endpoint Central Server.
    • Execute any web executable throughout the network using directory traversal or file type restriction by-pass.

How do I fix it?

These vulnerabilities have been identified and fixed. To apply the fix, follow the steps mentioned below:

  1. Log in to your Endpoint Central console, click on your current build number on the top right corner.
  2. You can find the latest build applicable to you. Download the PPM and update.

 

Keywords: Query Execution, Security Updates, Vulnerabilities and Fixes.

 

Trusted by