CVE-2019-19620

In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a file. This is limited in scope to the collection of process-execution telemetry, for executions against specific files where the SYSTEM user was denied access to the source file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dell:red_cloak_windows_agent:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:07

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@CowbellSteve/secureworks-red-cloak-local-bypass-bfaed2be407e', 'name': 'https://medium.com/@CowbellSteve/secureworks-red-cloak-local-bypass-bfaed2be407e', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40CowbellSteve/secureworks-red-cloak-local-bypass-bfaed2be407e -

Information

Published : 2019-12-06 16:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-19620

Mitre link : CVE-2019-19620

CVE.ORG link : CVE-2019-19620


JSON object : View

Products Affected

dell

  • red_cloak_windows_agent
CWE
CWE-281

Improper Preservation of Permissions