An issue in mRemoteNG v1.76.20 allows attackers to escalate privileges via a crafted executable file. NOTE: third parties were unable to reproduce any scenario in which the claimed access of BUILTIN\Users:(M) is present.
References
Configurations
History
07 Nov 2023, 03:19
Type | Values Removed | Values Added |
---|---|---|
Summary | An issue in mRemoteNG v1.76.20 allows attackers to escalate privileges via a crafted executable file. NOTE: third parties were unable to reproduce any scenario in which the claimed access of BUILTIN\Users:(M) is present. |
17 Feb 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Feb 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | ** DISPUTED ** An issue in mRemoteNG v1.76.20 allows attackers to escalate privileges via a crafted executable file. NOTE: third parties were unable to reproduce any scenario in which the claimed access of BUILTIN\Users:(M) is present. |
09 Feb 2023, 19:46
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Mremoteng
Mremoteng mremoteng |
|
References | (MISC) https://packetstormsecurity.com/files/170794/mRemoteNG-1.76.20-Privilege-Escalation.html - Third Party Advisory, VDB Entry | |
References | (MISC) https://github.com/NyaMeeEain/Infrastructure-Assessment/blob/master/Privilege%20Escalation/Common%20Windows%20Privilege%20Escalation.md - Not Applicable | |
CPE | cpe:2.3:a:mremoteng:mremoteng:1.76.20:*:*:*:*:*:*:* | |
CWE | CWE-269 |
02 Feb 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-02 12:15
Updated : 2024-04-11 01:07
NVD link : CVE-2020-24307
Mitre link : CVE-2020-24307
CVE.ORG link : CVE-2020-24307
JSON object : View
Products Affected
mremoteng
- mremoteng
CWE
CWE-269
Improper Privilege Management