{"api_version":"1","generated_at":"2026-04-23T18:45:29+00:00","cve":"CVE-2000-0650","urls":{"html":"https://cve.report/CVE-2000-0650","api":"https://cve.report/api/cve/CVE-2000-0650.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2000-0650","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2000-0650"},"summary":{"title":"CVE-2000-0650","description":"The default installation of VirusScan 4.5 and NetShield 4.5 has insecure permissions for the registry key that identifies the AutoUpgrade directory, which allows local users to execute arbitrary commands by replacing SETUP.EXE in that directory with a Trojan Horse.","state":"PUBLISHED","assigner":"mitre","published_at":"2000-07-11 04:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"2.1","severity":"","vector":"AV:L/AC:L/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"http://www.osvdb.org/1458","name":"http://www.osvdb.org/1458","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0007&L=ntbugtraq&F=&S=&P=2753","name":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0007&L=ntbugtraq&F=&S=&P=2753","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5177","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5177","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/4200","name":"http://www.osvdb.org/4200","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.securityfocus.com/bid/1458","name":"http://www.securityfocus.com/bid/1458","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"NAI VirusScan/NetShield AutoUpgrade Executable Verification Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2000-0650","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2000-0650","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2000","cve_id":"650","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"network_associates","cpe5":"netshield","cpe6":"4.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"650","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"network_associates","cpe5":"virusscan","cpe6":"4.5","cpe7":"*","cpe8":"windows_nt","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T05:28:40.599Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"1458","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/1458"},{"name":"nai-virusscan-netshield-autoupgrade(5177)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5177"},{"name":"1458","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/1458"},{"name":"4200","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/4200"},{"name":"20000711 Potential Vulnerability in McAfee Netshield and VirusScan 4.5","tags":["mailing-list","x_refsource_NTBUGTRAQ","x_transferred"],"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0007&L=ntbugtraq&F=&S=&P=2753"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2000-07-11T00:00:00.000Z","descriptions":[{"lang":"en","value":"The default installation of VirusScan 4.5 and NetShield 4.5 has insecure permissions for the registry key that identifies the AutoUpgrade directory, which allows local users to execute arbitrary commands by replacing SETUP.EXE in that directory with a Trojan Horse."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2004-09-02T09:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"1458","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/1458"},{"name":"nai-virusscan-netshield-autoupgrade(5177)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5177"},{"name":"1458","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/1458"},{"name":"4200","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/4200"},{"name":"20000711 Potential Vulnerability in McAfee Netshield and VirusScan 4.5","tags":["mailing-list","x_refsource_NTBUGTRAQ"],"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0007&L=ntbugtraq&F=&S=&P=2753"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2000-0650","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The default installation of VirusScan 4.5 and NetShield 4.5 has insecure permissions for the registry key that identifies the AutoUpgrade directory, which allows local users to execute arbitrary commands by replacing SETUP.EXE in that directory with a Trojan Horse."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"1458","refsource":"BID","url":"http://www.securityfocus.com/bid/1458"},{"name":"nai-virusscan-netshield-autoupgrade(5177)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5177"},{"name":"1458","refsource":"OSVDB","url":"http://www.osvdb.org/1458"},{"name":"4200","refsource":"OSVDB","url":"http://www.osvdb.org/4200"},{"name":"20000711 Potential Vulnerability in McAfee Netshield and VirusScan 4.5","refsource":"NTBUGTRAQ","url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0007&L=ntbugtraq&F=&S=&P=2753"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2000-0650","datePublished":"2001-05-07T04:00:00.000Z","dateReserved":"2000-08-02T00:00:00.000Z","dateUpdated":"2024-08-08T05:28:40.599Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2000-07-11 04:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:network_associates:netshield:4.5:*:*:*:*:*:*:*","matchCriteriaId":"AE266076-85EF-4240-811D-FCC90970728A"},{"vulnerable":true,"criteria":"cpe:2.3:a:network_associates:virusscan:4.5:*:windows_nt:*:*:*:*:*","matchCriteriaId":"3F370D4D-5702-46B1-90C5-9D328B24ED55"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2000","CveId":"650","Ordinal":"1","Title":"CVE-2000-0650","CVE":"CVE-2000-0650","Year":"2000"},"notes":[{"CveYear":"2000","CveId":"650","Ordinal":"1","NoteData":"The default installation of VirusScan 4.5 and NetShield 4.5 has insecure permissions for the registry key that identifies the AutoUpgrade directory, which allows local users to execute arbitrary commands by replacing SETUP.EXE in that directory with a Trojan Horse.","Type":"Description","Title":"CVE-2000-0650"},{"CveYear":"2000","CveId":"650","Ordinal":"2","NoteData":"2001-05-07","Type":"Other","Title":"Published"},{"CveYear":"2000","CveId":"650","Ordinal":"3","NoteData":"2004-09-02","Type":"Other","Title":"Modified"}]}}}