London Trust Media Private Internet Access におけるアクセス制御に関する脆弱性
| Title |
London Trust Media Private Internet Access におけるアクセス制御に関する脆弱性
|
| Summary |
London Trust Media Private Internet Access には、アクセス制御に関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
April 5, 2018, midnight |
| Registration Date |
June 19, 2018, 5:43 p.m. |
| Last Update |
June 19, 2018, 5:43 p.m. |
|
CVSS3.0 : 重要
|
| Score |
7.8
|
| Vector |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
7.2
|
| Vector |
AV:L/AC:L/Au:N/C:C/I:C/A:C |
Affected System
| London Trust Media, Inc. |
|
Private Internet Access v77
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年06月19日] 掲載 |
June 19, 2018, 5:43 p.m. |
NVD Vulnerability Information
CVE-2018-10190
| Summary |
A vulnerability in London Trust Media Private Internet Access (PIA) VPN Client v77 for Windows could allow an unauthenticated, local attacker to run executable files with elevated privileges. The vulnerability is due to insufficient implementation of access controls. The "Changelog" and "Help" options available from the system tray context menu spawn an elevated instance of the user's default web browser. An attacker could exploit this vulnerability by selecting "Run as Administrator" from the context menu of an executable file within the file browser of the spawned default web browser. This may allow the attacker to execute privileged commands on the targeted system.
|
| Publication Date |
April 18, 2018, 5:29 a.m. |
| Registration Date |
March 1, 2021, 6:41 p.m. |
| Last Update |
Nov. 21, 2024, 12:40 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:londontrustmedia:private_internet_access:77:*:*:*:*:windows:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List