{ "schema_version": "1.4.0", "id": "GHSA-cv2p-jhjf-54gq", "modified": "2022-05-13T01:50:41Z", "published": "2022-05-13T01:50:41Z", "aliases": [ "CVE-2018-18435" ], "details": "KioWare Server version 4.9.6 and older installs by default to \"C:\\kioware_com\" with weak folder permissions granting any user full permission \"Everyone: (F)\" to the contents of the directory and it's sub-folders. In addition, the program installs a service called \"KWSService\" which runs as \"Localsystem\", this will allow any user to escalate privileges to \"NT AUTHORITY\\SYSTEM\" by substituting the service's binary with a malicious one.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18435" }, { "type": "WEB", "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-002.md" }, { "type": "WEB", "url": "https://m.kioware.com/news/kioware-press-releases/kioware_server_security_patch_update" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/46093" }, { "type": "WEB", "url": "https://www.kioware.com/patch.aspx" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/151031/KioWare-Server-4.9.6-Privilege-Escalation.html" } ], "database_specific": { "cwe_ids": [ "CWE-732" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-03-21T16:00:00Z" } }