Vulnerability Description
Panda Security URL Filtering before 4.3.1.9 uses a weak ACL for the "Panda Security URL Filtering" directory and installed files, which allows local users to gain SYSTEM privileges by modifying Panda_URL_Filteringb.exe.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Watchguard | Panda Url Filtering | <= 4.3.1.8 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/136607/Panda-Security-URL-Filtering-PrivileThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2016/Apr/25Mailing ListThird Party Advisory
- https://www.exploit-db.com/exploits/39670/Third Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/136607/Panda-Security-URL-Filtering-PrivileThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2016/Apr/25Mailing ListThird Party Advisory
- https://www.exploit-db.com/exploits/39670/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2015-7378?
CVE-2015-7378 is a vulnerability with a CVSS score of 7.8 (HIGH). Panda Security URL Filtering before 4.3.1.9 uses a weak ACL for the "Panda Security URL Filtering" directory and installed files, which allows local users to gain SYSTEM privileges by modifying Panda_...
How severe is CVE-2015-7378?
CVE-2015-7378 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7378?
Check the references section above for vendor advisories and patch information. Affected products include: Watchguard Panda Url Filtering.