Vulnerability Description
An exploitable local privilege escalation vulnerability exists in the GalaxyClientService installed by GOG Galaxy. Due to Improper Access Control, an attacker can send unauthenticated local TCP packets to the service to gain SYSTEM privileges in Windows system where GOG Galaxy software is installed. All GOG Galaxy versions before 1.2.60 and all corresponding versions of GOG Galaxy 2.0 Beta are affected.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gog | Galaxy | < 1.2.60 |
Related Weaknesses (CWE)
References
- https://cqureacademy.com/cqure-labs/cqlabs-cve-2019-15511-broken-access-control-Third Party AdvisoryVendor Advisory
- https://support.gog.com/hc/en-us/articles/360025458833-GOG-GALAXY-2-0-updates-anRelease NotesVendor Advisory
- https://cqureacademy.com/cqure-labs/cqlabs-cve-2019-15511-broken-access-control-Third Party AdvisoryVendor Advisory
- https://support.gog.com/hc/en-us/articles/360025458833-GOG-GALAXY-2-0-updates-anRelease NotesVendor Advisory
FAQ
What is CVE-2019-15511?
CVE-2019-15511 is a vulnerability with a CVSS score of 7.8 (HIGH). An exploitable local privilege escalation vulnerability exists in the GalaxyClientService installed by GOG Galaxy. Due to Improper Access Control, an attacker can send unauthenticated local TCP packet...
How severe is CVE-2019-15511?
CVE-2019-15511 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15511?
Check the references section above for vendor advisories and patch information. Affected products include: Gog Galaxy.