Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-5538 |
CWE-ID | CWE-264 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Pallet Control Other software / Other software solutions |
Vendor | JAL Information Technology Co.,Ltd. |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU27674
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-5538
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper file access permission. A local user who can login to the computer where the vulnerable product is installed can execute arbitrary code with SYSTEM privilege.
Note: According to the developer, PalletControl 7 to 9.1 are not affected by this vulnerability. However under the environment where PLS Management Add-on Module is used, all versions are affected.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPallet Control: 6.3
External linkshttp://jvn.jp/en/jp/JVN61849442/index.html
http://www.jalinfotec.co.jp/product/pallet/support/Info/notices.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.