Vulnerability Description
An issue was discovered in Dual DHCP DNS Server 7.40. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the DualServer.exe binary.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dual Dhcp Dns Server Project | Dual Dhcp Dns Server | 7.40 |
Related Weaknesses (CWE)
References
- https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26133.md
- https://github.com/an0ry/advisoriesThird Party Advisory
- https://sourceforge.net/projects/dhcp-dns-server/Product
- https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26133.md
- https://github.com/an0ry/advisoriesThird Party Advisory
- https://sourceforge.net/projects/dhcp-dns-server/Product
FAQ
What is CVE-2020-26133?
CVE-2020-26133 is a vulnerability with a CVSS score of 7.8 (HIGH). An issue was discovered in Dual DHCP DNS Server 7.40. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the DualServer.exe ...
How severe is CVE-2020-26133?
CVE-2020-26133 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-26133?
Check the references section above for vendor advisories and patch information. Affected products include: Dual Dhcp Dns Server Project Dual Dhcp Dns Server.