CVE-2019-5631
CVSS V2 High 9.3
CVSS V3 High 7.8
Description
The Rapid7 InsightAppSec broker suffers from a DLL injection vulnerability in the 'prunsrv.exe' component of the product. If exploited, a local user of the system (who must already be authenticated to the operating system) can elevate their privileges with this vulnerability to the privilege level of InsightAppSec (usually, SYSTEM). This issue affects version 2019.06.24 and prior versions of the product.
Overview
- CVE ID
- CVE-2019-5631
- Assigner
- cve@rapid7.con
- Vulnerability Status
- Analyzed
- Published Version
- 2019-08-19T15:15:11
- Last Modified Date
- 2023-03-29T16:22:43
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:rapid7:insightappsec:*:*:*:*:*:*:*:* | 1 | OR | 2019.06.24 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 9.3
- Severity
- HIGH
- Exploitability Score
- 8.6
- Impact Score
- 10
CVSS Version 3
- Version
- 3.0
- Vector String
- CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Attack Vector
- LOCAL
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- REQUIRED
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 7.8
- Base Severity
- HIGH
- Exploitability Score
- 1.8
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://help.rapid7.com/insightappsec/release-notes/archive/2019/07/ | Release Notes Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2019-5631 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5631 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 17:02:29 | Added to TrackCVE | |||
2022-12-04 01:20:35 | cve@rapid7.com | cve@rapid7.con | CVE Assigner | updated |
2022-12-04 01:20:35 | 2019-08-19T15:15Z | 2019-08-19T15:15:11 | CVE Published Date | updated |
2022-12-04 01:20:35 | 2019-10-09T23:51:00 | CVE Modified Date | updated | |
2022-12-04 01:20:35 | Modified | Vulnerability Status | updated | |
2022-12-31 00:11:00 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2022-12-31 00:11:03 | Weakness Enumeration | update | ||
2023-03-31 06:10:20 | 2023-03-29T16:22:43 | CVE Modified Date | updated | |
2023-03-31 06:10:20 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |