{ "schema_version": "1.4.0", "id": "GHSA-g957-q4vg-hrv6", "modified": "2022-05-24T16:58:38Z", "published": "2022-05-24T16:58:38Z", "aliases": [ "CVE-2019-14510" ], "details": "An issue was discovered in Kaseya VSA RMM through 9.5.0.22. When using the default configuration, the LAN Cache feature creates a local account FSAdminxxxxxxxxx (e.g., FSAdmin123456789) on the server that hosts the LAN Cache and all clients that are assigned to a LAN Cache. This account is placed into the local Administrators group of all clients assigned to the LAN Cache. When the assigned client is a Domain Controller, the FSAdminxxxxxxxxx account is created as a domain account and automatically added as a member of the domain BUILTIN\\Administrators group. Using the well known Pass-the-Hash techniques, an attacker can use the same FSAdminxxxxxxxxx hash from any LAN Cache client and pass this to a Domain Controller, providing administrative rights to the attacker on any Domain Controller. (Local account Pass-the-Hash mitigations do not protect domain accounts.)", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14510" }, { "type": "WEB", "url": "https://lockstepgroup.com/blog/abusing-the-kaseya-lan-cache-fsadmin" }, { "type": "WEB", "url": "https://lockstepgroup.com/blog/cve-2019-14510-abusing-the-kaseya-lan-cache-fsadmin-red-team-edition" }, { "type": "WEB", "url": "https://www.kaseya.com/products/vsa" }, { "type": "WEB", "url": "http://community.kaseya.com/xsp/f/355.aspx" }, { "type": "WEB", "url": "http://community.kaseya.com/xsp/f/355/t/24675.aspx" } ], "database_specific": { "cwe_ids": [ "CWE-276" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-10-11T12:15:00Z" } }