Lucene search

K
cvelistMitreCVELIST:CVE-2018-5354
HistorySep 29, 2020 - 7:54 p.m.

CVE-2018-5354

2020-09-2919:54:52
mitre
www.cve.org
7
anixis password reset
remote code execution
privilege escalation
spoofing
http
authentication
winlogon.exe
network level authentication
rdp

AI Score

9.2

Confidence

High

EPSS

0.005

Percentile

76.3%

The custom GINA/CP module in ANIXIS Password Reset Client before version 3.22 allows remote attackers to execute code and escalate privileges via spoofing. When the client is configured to use HTTP, it does not authenticate the intended server before opening a browser window. An unauthenticated attacker capable of conducting a spoofing attack can redirect the browser to gain execution in the context of the WinLogon.exe process. If Network Level Authentication is not enforced, the vulnerability can be exploited via RDP.

AI Score

9.2

Confidence

High

EPSS

0.005

Percentile

76.3%

Related for CVELIST:CVE-2018-5354