HIGH · 7.8

CVE-2020-7821

Nexacro14/17 ExtCommonApiV13 Library under 2019.9.6 version contain a vulnerability that could allow remote attacker to execute arbitrary code by modifying the value of registry path. This can be leve...

Vulnerability Description

Nexacro14/17 ExtCommonApiV13 Library under 2019.9.6 version contain a vulnerability that could allow remote attacker to execute arbitrary code by modifying the value of registry path. This can be leveraged for code execution by rebooting the victim’s PC

CVSS Score

7.8

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
NexawebNexacro 14< 2019.9.6
NexawebNexacro 17< 2019.9.6
MicrosoftWindows-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-7821?

CVE-2020-7821 is a vulnerability with a CVSS score of 7.8 (HIGH). Nexacro14/17 ExtCommonApiV13 Library under 2019.9.6 version contain a vulnerability that could allow remote attacker to execute arbitrary code by modifying the value of registry path. This can be leve...

How severe is CVE-2020-7821?

CVE-2020-7821 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-7821?

Check the references section above for vendor advisories and patch information. Affected products include: Nexaweb Nexacro 14, Nexaweb Nexacro 17, Microsoft Windows.