{"api_version":"1","generated_at":"2026-05-13T11:00:46+00:00","cve":"CVE-2006-7129","urls":{"html":"https://cve.report/CVE-2006-7129","api":"https://cve.report/api/cve/CVE-2006-7129.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-7129","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-7129"},"summary":{"title":"CVE-2006-7129","description":"ISS BlackICE PC Protection 3.6 cpj and cpu, and possibly earlier versions, allows local users to bypass the protection scheme by using the ZwDeleteFile API function to delete the critical filelock.txt file, which stores information about protected files.","state":"PUBLISHED","assigner":"mitre","published_at":"2007-03-06 01:19:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"2.1","severity":"","vector":"AV:L/AC:L/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"http://www.securityfocus.com/bid/20546","name":"http://www.securityfocus.com/bid/20546","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Internet Security Systems ZWDeleteFile Function Arbitrary File Deletion Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://securityreason.com/securityalert/2361","name":"http://securityreason.com/securityalert/2361","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"CXSecurity - IDS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0298.html","name":"http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0298.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29575","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29575","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/448763/100/0/threaded","name":"http://www.securityfocus.com/archive/1/448763/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/30901","name":"http://www.osvdb.org/30901","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.matousec.com/info/advisories/BlackICE-Filelock-protection-bypass.php","name":"http://www.matousec.com/info/advisories/BlackICE-Filelock-protection-bypass.php","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisory 2006-10-15.01 - matousec.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-7129","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-7129","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"7129","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"iss","cpe5":"blackice_pc_protection","cpe6":"3.6cpj","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"7129","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"iss","cpe5":"blackice_pc_protection","cpe6":"3.6cpu","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T20:50:06.200Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"20061015 ISS BlackICE PC Protection Filelock protection bypass Vulnerability","tags":["mailing-list","x_refsource_FULLDISC","x_transferred"],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0298.html"},{"name":"2361","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/2361"},{"name":"20546","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/20546"},{"name":"30901","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/30901"},{"name":"20061015 ISS BlackICE PC Protection Filelock protection bypass Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/448763/100/0/threaded"},{"name":"blackice-filelock-protection-bypass(29575)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29575"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.matousec.com/info/advisories/BlackICE-Filelock-protection-bypass.php"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-10-15T00:00:00.000Z","descriptions":[{"lang":"en","value":"ISS BlackICE PC Protection 3.6 cpj and cpu, and possibly earlier versions, allows local users to bypass the protection scheme by using the ZwDeleteFile API function to delete the critical filelock.txt file, which stores information about protected files."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-16T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"20061015 ISS BlackICE PC Protection Filelock protection bypass Vulnerability","tags":["mailing-list","x_refsource_FULLDISC"],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0298.html"},{"name":"2361","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/2361"},{"name":"20546","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/20546"},{"name":"30901","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/30901"},{"name":"20061015 ISS BlackICE PC Protection Filelock protection bypass Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/448763/100/0/threaded"},{"name":"blackice-filelock-protection-bypass(29575)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29575"},{"tags":["x_refsource_MISC"],"url":"http://www.matousec.com/info/advisories/BlackICE-Filelock-protection-bypass.php"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-7129","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"ISS BlackICE PC Protection 3.6 cpj and cpu, and possibly earlier versions, allows local users to bypass the protection scheme by using the ZwDeleteFile API function to delete the critical filelock.txt file, which stores information about protected files."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20061015 ISS BlackICE PC Protection Filelock protection bypass Vulnerability","refsource":"FULLDISC","url":"http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0298.html"},{"name":"2361","refsource":"SREASON","url":"http://securityreason.com/securityalert/2361"},{"name":"20546","refsource":"BID","url":"http://www.securityfocus.com/bid/20546"},{"name":"30901","refsource":"OSVDB","url":"http://www.osvdb.org/30901"},{"name":"20061015 ISS BlackICE PC Protection Filelock protection bypass Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/448763/100/0/threaded"},{"name":"blackice-filelock-protection-bypass(29575)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29575"},{"name":"http://www.matousec.com/info/advisories/BlackICE-Filelock-protection-bypass.php","refsource":"MISC","url":"http://www.matousec.com/info/advisories/BlackICE-Filelock-protection-bypass.php"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-7129","datePublished":"2007-03-06T01:00:00.000Z","dateReserved":"2007-03-05T00:00:00.000Z","dateUpdated":"2024-08-07T20:50:06.200Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2007-03-06 01:19:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:iss:blackice_pc_protection:3.6cpj:*:*:*:*:*:*:*","matchCriteriaId":"0EA7FE32-A0F1-47DD-A306-E0369093083C"},{"vulnerable":true,"criteria":"cpe:2.3:a:iss:blackice_pc_protection:3.6cpu:*:*:*:*:*:*:*","matchCriteriaId":"8EE7A456-FD11-4506-8015-677CDD8912D1"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"7129","Ordinal":"1","Title":"CVE-2006-7129","CVE":"CVE-2006-7129","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"7129","Ordinal":"1","NoteData":"ISS BlackICE PC Protection 3.6 cpj and cpu, and possibly earlier versions, allows local users to bypass the protection scheme by using the ZwDeleteFile API function to delete the critical filelock.txt file, which stores information about protected files.","Type":"Description","Title":"CVE-2006-7129"},{"CveYear":"2006","CveId":"7129","Ordinal":"2","NoteData":"2007-03-05","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"7129","Ordinal":"3","NoteData":"2018-10-16","Type":"Other","Title":"Modified"}]}}}