Total Defense Anti-virus 9.0.0.773 insecure access control vulnerability (CVE-2019-13355) allows local attackers to escalate privileges. Learn about impact, affected systems, and mitigation steps.
Total Defense Anti-virus 9.0.0.773 is vulnerable to insecure access control, allowing local attackers to exploit the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\ and potentially gain privilege escalation.
Understanding CVE-2019-13355
This CVE identifies a security vulnerability in Total Defense Anti-virus 9.0.0.773 that can be exploited by local attackers for privilege escalation.
What is CVE-2019-13355?
The vulnerability in Total Defense Anti-virus 9.0.0.773 allows local attackers to take control of dotnetproxy.exe, leading to privilege escalation when the ccSchedulerSVC service executes the file.
The Impact of CVE-2019-13355
The vulnerability poses a significant risk as it enables attackers to escalate their privileges within the system, potentially compromising sensitive data and system integrity.
Technical Details of CVE-2019-13355
Total Defense Anti-virus 9.0.0.773 is affected by the following technical details:
Vulnerability Description
The insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\ in Total Defense Anti-virus 9.0.0.773 allows local attackers to hijack dotnetproxy.exe, leading to privilege escalation when the ccSchedulerSVC service runs the executable.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by local attackers to manipulate dotnetproxy.exe, leveraging it for privilege escalation when executed by the ccSchedulerSVC service.
Mitigation and Prevention
To address CVE-2019-13355, consider the following mitigation strategies:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that Total Defense Anti-virus is updated to the latest version to mitigate the vulnerability and enhance system security.