Vulnerability CVE-2020-15261


Published: 2020-10-19   Modified: 2020-10-20

Description:
On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Veyon 4.4.1 VeyonService Unquoted Service Path
11.07.2021

Type:

CWE-428

(Unquoted Search Path or Element)

 References:
https://github.com/veyon/veyon/commit/f231ec511b9a09f43f49b2c7bb7c60b8046276b1
https://github.com/veyon/veyon/issues/657
https://github.com/veyon/veyon/security/advisories/GHSA-c8cc-x786-hqqp

Copyright 2024, cxsecurity.com

 

Back to Top