Vulnerability Description
In Cylance CylancePROTECT before 1470, an unprivileged local user can obtain SYSTEM privileges because users have Modify access to the %PROGRAMFILES%\Cylance\Desktop\log folder, the CyUpdate process grants users Modify access to new files created in this folder, and a new file can be a symlink chain to a pathname of an arbitrary DLL that CyUpdate uses.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cylance | Cylanceprotect | < 1470 |
Related Weaknesses (CWE)
References
- https://www.atredis.com/blog/cylance-privilege-escalation-vulnerabilityExploitTechnical DescriptionThird Party Advisory
- https://www.atredis.com/blog/cylance-privilege-escalation-vulnerabilityExploitTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2018-10722?
CVE-2018-10722 is a vulnerability with a CVSS score of 7.8 (HIGH). In Cylance CylancePROTECT before 1470, an unprivileged local user can obtain SYSTEM privileges because users have Modify access to the %PROGRAMFILES%\Cylance\Desktop\log folder, the CyUpdate process g...
How severe is CVE-2018-10722?
CVE-2018-10722 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10722?
Check the references section above for vendor advisories and patch information. Affected products include: Cylance Cylanceprotect.