Privilege escalation in Thales DIS SafeNet Sentinel LDK License Manager



Published: 2019-12-06
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-18232
CWE-ID CWE-59
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
SafeNet Sentinel LDK License Manager
Client/Desktop applications / Other client software

Vendor Thales Group

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Link following

EUVDB-ID: #VU23431

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-18232

CWE-ID: CWE-59 - Improper Link Resolution Before File Access ('Link Following')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists when the affected product is configured as a service due to improper handling symbolic links. A local user can create, write, and/or delete files in system folder using symbolic links and escalate privileges on the target system.

This vulnerability can also be used by an attacker to execute a malicious DLL, which could impact the integrity and availability of the system. 

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SafeNet Sentinel LDK License Manager: before 7.101

External links

http://ics-cert.us-cert.gov/advisories/icsa-19-339-01


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###