Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-19620


In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a file. This is limited in scope to the collection of process-execution telemetry, for executions against specific files where the SYSTEM user was denied access to the source file.


Published

2019-12-06T16:15:11.187

Last Modified

2024-11-21T04:35:04.697

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 3.3 (LOW)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

3.9

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-281

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application dell red_cloak_windows_agent < 2.0.7.9 Yes

References