Important Information

On August 12th, 2022, many of Keysight’s Network Test, Network Visibility, & Edge to Core (NAS/formerly Ixia) products will migrate to a new license structure.

CRITICAL: If you perform licensing operations after August 12th, 2022, without upgrading the licensing software to the latest version, licenses may not register properly, and some features may be missing. This could impact testing and result in downtime.

For details, click here.

Strike ID:
E18-mboq1
CVSS:
6.8 (AV:L/AC:L/Au:S/C:C/I:C/A:C)
False Positive:
t
Variants:
1
Year:
2018

Description

This strike exploits a privilege escalation flaw in Microsoft Windows Task Scheduler ALPC endpoint. The vulnerability consists in the fact that the Task Schedulers ALPC endpoint doesnt impersonate the user that initiates the calls. This allows a low privilege user to change the access control lists of an arbitrary file using the endpoints SchRpcSetSecurity method. Successful exploitation may lead from arbitrary read/writes to code execution under SYSTEM privileges.

CVE

References

MSB

BID

ExploitDB

Secunia

Security Tracker

Metasploit

ZDI

Google

OSVDB

{}