{ "schema_version": "1.4.0", "id": "GHSA-qmfq-w4vr-f499", "modified": "2022-05-13T01:49:42Z", "published": "2022-05-13T01:49:42Z", "aliases": [ "CVE-2018-13013" ], "details": "Improper check of unusual conditions when launching msiexec.exe in safensec.com (SysWatch service) in SAFE'N'SEC SoftControl/SafenSoft SysWatch, SoftControl/SafenSoft TPSecure, and SoftControl/SafenSoft Enterprise Suite before 4.4.9 allows the local attacker to bypass a code-signing protection mechanism and install/execute an unauthorized program by modifying the system configuration and installing a forged MSI file. (The intended behavior is that the component SysWatch does not allow installation of MSI files unless they are signed by a limited list of certificates.)", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13013" }, { "type": "WEB", "url": "http://www.safensoft.com/security.phtml?c=865#SNSVE-2018-3" } ], "database_specific": { "cwe_ids": [ "CWE-754" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-06-29T15:29:00Z" } }