Vulnerability Description
Thomson Reuters Eikon 4.0.42144 allows all local users to modify the service executable file because of weak %PROGRAMFILES(X86)%\Thomson Reuters\Eikon permissions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Thomsonreuters | Eikon | 4.0.42144 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/158989/Eikon-Thomson-Reuters-4.0.42144-FileExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2020/Aug/19ExploitMailing ListThird Party Advisory
- https://sec-consult.com/en/blog/advisories/extensive-file-permissions-on-serviceThird Party Advisory
- https://www.sec-consult.com/en/vulnerability-lab/advisories/index.htmlThird Party Advisory
- https://www.thomsonreuters.com/en/products-services.htmlVendor Advisory
- http://packetstormsecurity.com/files/158989/Eikon-Thomson-Reuters-4.0.42144-FileExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2020/Aug/19ExploitMailing ListThird Party Advisory
- https://sec-consult.com/en/blog/advisories/extensive-file-permissions-on-serviceThird Party Advisory
- https://www.sec-consult.com/en/vulnerability-lab/advisories/index.htmlThird Party Advisory
- https://www.thomsonreuters.com/en/products-services.htmlVendor Advisory
FAQ
What is CVE-2019-10679?
CVE-2019-10679 is a vulnerability with a CVSS score of 7.8 (HIGH). Thomson Reuters Eikon 4.0.42144 allows all local users to modify the service executable file because of weak %PROGRAMFILES(X86)%\Thomson Reuters\Eikon permissions.
How severe is CVE-2019-10679?
CVE-2019-10679 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10679?
Check the references section above for vendor advisories and patch information. Affected products include: Thomsonreuters Eikon.