CVE-2017-20218
🟡 Monitoruj
Podatność w Serviio PRO 1.8 umożliwia lokalnym użytkownikom wykonanie dowolnego kodu z podwyższonymi uprawnieniami przez umieszczenie złośliwych…
CVSS
7.8
EPSS
0.0%
Exploit
none
Vendor
Opis źródłowy (NVD)
Serviio PRO 1.8 contains an unquoted search path vulnerability in the Windows service that allows local users to execute arbitrary code with elevated privileges by placing malicious executables in the system root path. Additionally, improper directory permissions with full access for the Users group allow authenticated users to replace the executable file with arbitrary binaries, enabling privilege escalation during service startup or system reboot.
privilege-escalation
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-03-16 14:17:51 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-16 14:53:46 UTC |
Referencje
- https://blogs.securiteam.com/index.php/archives/3094 (disclosure@vulncheck.com)
- https://cxsecurity.com/issue/WLB-2017050019 (disclosure@vulncheck.com)
- https://exchange.xforce.ibmcloud.com/vulnerabilities/125644 (disclosure@vulncheck.com)
- https://packetstormsecurity.com/files/142384 (disclosure@vulncheck.com)
- https://www.exploit-db.com/exploits/41959/ (disclosure@vulncheck.com)
- https://www.vulncheck.com/advisories/serviio-pro-local-privilege-escalation-via-unquoted-path (disclosure@vulncheck.com)
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5405.php (disclosure@vulncheck.com)