AnyDesk before 6.1.0 on Windows, when run in portable mode on a system where the attacker has write access to the application directory, allows this attacker to compromise a local user account via a read-only setting for a Trojan horse gcapi.dll file.
References
Link | Resource |
---|---|
https://anydesk.com/cve/2020-35483/ | Vendor Advisory |
Configurations
History
20 Jan 2021, 02:49
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://anydesk.com/cve/2020-35483/ - Vendor Advisory | |
CWE | CWE-427 | |
CVSS |
v2 : v3 : |
v2 : 4.4
v3 : 7.8 |
CPE | cpe:2.3:a:anydesk:anydesk:*:*:*:*:*:windows:*:* |
11 Jan 2021, 16:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-01-11 15:15
Updated : 2023-12-10 13:41
NVD link : CVE-2020-35483
Mitre link : CVE-2020-35483
CVE.ORG link : CVE-2020-35483
JSON object : View
Products Affected
anydesk
- anydesk
CWE
CWE-427
Uncontrolled Search Path Element