Vulnerability identifier: #VU37444
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Panda Global Protection
Client/Desktop applications /
Antivirus software/Personal firewalls
Vendor: Panda Security SL
Description
The vulnerability allows a local authenticated user to execute arbitrary code.
Panda Global Protection 17.0.1 allows local users to gain privileges or cause a denial of service by impersonating all the pipes through a use of .pipePSANMSrvcPpal -- an "insecurely created named pipe." Ensures full access to Everyone users group.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Panda Global Protection: 17.0.1
External links
https://seclists.org/fulldisclosure/2018/Mar/26
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.