CVE-2021-26624

An local privilege escalation vulnerability due to a "runasroot" command in eScan Anti-Virus. This vulnerability is due to invalid arguments and insufficient execution conditions related to "runasroot" command. This vulnerability can induce remote attackers to exploit root privileges by manipulating parameter values.
Configurations

Configuration 1 (hide)

cpe:2.3:a:escanav:escan_anti-virus:*:*:*:*:*:linux:*:*

History

09 Apr 2022, 00:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 10.0
v3 : 8.8
CPE cpe:2.3:a:escanav:escan_anti-virus:*:*:*:*:*:linux:*:*
First Time Escanav
Escanav escan Anti-virus
CWE CWE-20
References (MISC) https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66596 - (MISC) https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66596 - Third Party Advisory

01 Apr 2022, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-01 23:15

Updated : 2023-12-10 14:22


NVD link : CVE-2021-26624

Mitre link : CVE-2021-26624

CVE.ORG link : CVE-2021-26624


JSON object : View

Products Affected

escanav

  • escan_anti-virus
CWE
CWE-20

Improper Input Validation