Vulnerability Description
Zilab Remote Console Server 3.2.9 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in the service configuration to inject malicious executables that will be run with LocalSystem permissions.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- http://html.tucows.com/preview/340137/Zilab-Remote-Console-Server?q=remote+suppo
- https://www.exploit-db.com/exploits/47506
- https://www.vulncheck.com/advisories/zilab-remote-console-server-zilab-remote-co
FAQ
What is CVE-2019-25309?
CVE-2019-25309 is a vulnerability with a CVSS score of 7.8 (HIGH). Zilab Remote Console Server 3.2.9 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated system privileges. Attackers can explo...
How severe is CVE-2019-25309?
CVE-2019-25309 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-25309?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.