Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-15689 : Exploit Details and Defense Strategies

Learn about CVE-2019-15689, a vulnerability in Kaspersky security products allowing local users to execute arbitrary code without privilege escalation. Find out how to mitigate and prevent this issue.

A vulnerability in Kaspersky security products allows a local user to execute arbitrary code without privilege escalation.

Understanding CVE-2019-15689

This CVE involves a bug in Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, and Kaspersky Security Cloud versions prior to 2020 patch E.

What is CVE-2019-15689?

The vulnerability enables a local user with administrator rights to run a compromised file, executing arbitrary code. There is no privilege escalation, but certain security products may bypass whitelisting.

The Impact of CVE-2019-15689

        Local users can execute arbitrary code without privilege escalation
        Security products may bypass whitelisting

Technical Details of CVE-2019-15689

Vulnerability Description

The bug allows a local user to execute arbitrary code by running a compromised file.

Affected Systems and Versions

        Products: Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud
        Versions: Prior to version 2020 patch E

Exploitation Mechanism

        Local user with administrator rights can execute arbitrary code
        No privilege escalation involved
        Possibility of bypassing whitelisting by certain security products

Mitigation and Prevention

Immediate Steps to Take

        Apply the latest patch (version 2020 patch E) to mitigate the vulnerability
        Monitor for any unusual file executions

Long-Term Security Practices

        Regularly update security software to the latest versions
        Implement least privilege access for users

Patching and Updates

        Ensure all Kaspersky security products are updated to version 2020 patch E to address the vulnerability

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now