- Description
- Goverlan Reach Console before 9.50, Goverlan Reach Server before 3.50, and Goverlan Client Agent before 9.20.50 have an Untrusted Search Path that leads to Command Injection and Local Privilege Escalation via DLL hijacking.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 4.4
- Impact score
- 6.4
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-426
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:goverlan:client_agent:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B4E29DA2-1DD7-4236-B73F-6DE709CAB575",
"versionEndExcluding": "9.20.50"
},
{
"criteria": "cpe:2.3:a:goverlan:reach_console:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "44E28B02-3E63-47E8-A303-F5B3BAA5E412",
"versionEndExcluding": "9.50"
},
{
"criteria": "cpe:2.3:a:goverlan:reach_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2639091D-09DC-4B41-87C9-C2EA4FD10F99",
"versionEndExcluding": "3.50"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]