{"api_version":"1","generated_at":"2026-04-23T04:10:12+00:00","cve":"CVE-2019-12042","urls":{"html":"https://cve.report/CVE-2019-12042","api":"https://cve.report/api/cve/CVE-2019-12042.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-12042","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-12042"},"summary":{"title":"CVE-2019-12042","description":"Insecure permissions of the section object Global\\PandaDevicesAgentSharedMemory and the event Global\\PandaDevicesAgentSharedMemoryChange in Panda products before 18.07.03 allow attackers to queue an event (as an encrypted JSON string) to the system service AgentSvc.exe, which leads to privilege escalation when the CmdLineExecute event is queued. This affects Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection, and Panda Internet Security.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2019-05-23 14:29:00","updated_at":"2020-08-24 17:37:00"},"problem_types":["CWE-732"],"metrics":[],"references":[{"url":"https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html","name":"https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"Reverse Engineering 0x4 Fun: Panda Antivirus - Local Privilege Escalation (CVE-2019-12042)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.pandasecurity.com/usa/support/card?id=100063","name":"https://www.pandasecurity.com/usa/support/card?id=100063","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Vulnerability of local privilege escalation in the AgentSvc process with Consumer products (CVE-2019-12042) - Technical Support - Panda Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/SouhailHammou/Panda-Antivirus-LPE","name":"https://github.com/SouhailHammou/Panda-Antivirus-LPE","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"GitHub - SouhailHammou/Panda-Antivirus-LPE: The exploit for Panda AV LPE","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-12042","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12042","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"12042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pandasecurity","cpe5":"panda_antivirus","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"12042","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pandasecurity","cpe5":"panda_antivirus","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"12042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pandasecurity","cpe5":"panda_antivirus_pro","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"12042","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pandasecurity","cpe5":"panda_antivirus_pro","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"12042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pandasecurity","cpe5":"panda_dome","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"12042","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pandasecurity","cpe5":"panda_dome","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"12042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pandasecurity","cpe5":"panda_global_protection","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"12042","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pandasecurity","cpe5":"panda_global_protection","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"12042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pandasecurity","cpe5":"panda_gold_protection","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"12042","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pandasecurity","cpe5":"panda_gold_protection","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"12042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pandasecurity","cpe5":"panda_internet_security","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"12042","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pandasecurity","cpe5":"panda_internet_security","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2019-12042","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Insecure permissions of the section object Global\\PandaDevicesAgentSharedMemory and the event Global\\PandaDevicesAgentSharedMemoryChange in Panda products before 18.07.03 allow attackers to queue an event (as an encrypted JSON string) to the system service AgentSvc.exe, which leads to privilege escalation when the CmdLineExecute event is queued. This affects Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection, and Panda Internet Security."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://github.com/SouhailHammou/Panda-Antivirus-LPE","refsource":"MISC","name":"https://github.com/SouhailHammou/Panda-Antivirus-LPE"},{"refsource":"CONFIRM","name":"https://www.pandasecurity.com/usa/support/card?id=100063","url":"https://www.pandasecurity.com/usa/support/card?id=100063"},{"refsource":"MISC","name":"https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html","url":"https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html"}]}},"nvd":{"publishedDate":"2019-05-23 14:29:00","lastModifiedDate":"2020-08-24 17:37:00","problem_types":["CWE-732"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pandasecurity:panda_antivirus:*:*:*:*:*:*:*:*","versionEndExcluding":"18.07.03","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pandasecurity:panda_antivirus_pro:*:*:*:*:*:*:*:*","versionEndExcluding":"18.07.03","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pandasecurity:panda_dome:*:*:*:*:*:*:*:*","versionEndExcluding":"18.07.03","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pandasecurity:panda_global_protection:*:*:*:*:*:*:*:*","versionEndExcluding":"18.07.03","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pandasecurity:panda_gold_protection:*:*:*:*:*:*:*:*","versionEndExcluding":"18.07.03","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pandasecurity:panda_internet_security:*:*:*:*:*:*:*:*","versionEndExcluding":"18.07.03","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"12042","Ordinal":"150367","Title":"CVE-2019-12042","CVE":"CVE-2019-12042","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"12042","Ordinal":"1","NoteData":"Insecure permissions of the section object Global\\PandaDevicesAgentSharedMemory and the event Global\\PandaDevicesAgentSharedMemoryChange in Panda products before 18.07.03 allow attackers to queue an event (as an encrypted JSON string) to the system service AgentSvc.exe, which leads to privilege escalation when the CmdLineExecute event is queued. This affects Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection, and Panda Internet Security.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"12042","Ordinal":"2","NoteData":"2019-05-23","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"12042","Ordinal":"3","NoteData":"2019-05-23","Type":"Other","Title":"Modified"}]}}}