CVE-2019-7651
Summary
| CVE | CVE-2019-7651 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-02-08 22:29:00 UTC |
| Updated | 2020-08-24 17:37:00 UTC |
| Description | EPP.sys in Emsisoft Anti-Malware prior to version 2018.12 allows an attacker to bypass ACLs because Interpreted Device Characteristics lacks FILE_DEVICE_SECURE_OPEN and therefore files and directories "inside" the \\.\EPP device are not properly protected, leading to unintended impersonation or object creation. This vulnerability has been fixed in version 2018.12 and later. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Emsisoft | Anti-malware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Vulnerability report | Emsisoft Help | MISC | help.emsisoft.com | Vendor Advisory |
| Emsisoft Anti-Malware - ACLs Bypass - Security Research | MISC | nafiez.github.io | Exploit, Third Party Advisory |
| New in 2018.12: Safe web-browsing with Emsisoft Browser Security | Emsisoft | Security Blog | MISC | blog.emsisoft.com | Release Notes, Vendor Advisory |
| nafiez.github.io/2019-01-09-emsisoft-Anti-Malware-bypass.md at master · nafiez/nafiez.github.io · GitHub | MISC | github.com | Exploit, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.