{"api_version":"1","generated_at":"2026-04-23T09:51:02+00:00","cve":"CVE-2019-19364","urls":{"html":"https://cve.report/CVE-2019-19364","api":"https://cve.report/api/cve/CVE-2019-19364.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-19364","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-19364"},"summary":{"title":"CVE-2019-19364","description":"A weak malicious user can escalate its privilege whenever CatalystProductionSuite.2019.1.exe (version 1.1.0.21) and CatalystBrowseSuite.2019.1.exe (version 1.1.0.21) installers run. The vulnerability is in the form of DLL Hijacking. The installers try to load DLLs that don’t exist from its current directory; by doing so, an attacker can quickly escalate its privileges.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2019-12-04 19:15:00","updated_at":"2022-01-01 20:07:00"},"problem_types":["CWE-427"],"metrics":[],"references":[{"url":"https://gist.github.com/Eli-Paz/482b514320009f3e76ea712cde3bc350","name":"https://gist.github.com/Eli-Paz/482b514320009f3e76ea712cde3bc350","refsource":"MISC","tags":["Third Party Advisory"],"title":"SonyCreative Catalyst Privilege Escalation · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-19364","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19364","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"19364","vulnerable":"1","versionEndIncluding":"2019.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sony","cpe5":"catalyst_browse","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"19364","vulnerable":"1","versionEndIncluding":"2019.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sony","cpe5":"catalyst_production_suite","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2019-19364","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A weak malicious user can escalate its privilege whenever CatalystProductionSuite.2019.1.exe (version 1.1.0.21) and CatalystBrowseSuite.2019.1.exe (version 1.1.0.21) installers run. The vulnerability is in the form of DLL Hijacking. The installers try to load DLLs that don’t exist from its current directory; by doing so, an attacker can quickly escalate its privileges."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://gist.github.com/Eli-Paz/482b514320009f3e76ea712cde3bc350","url":"https://gist.github.com/Eli-Paz/482b514320009f3e76ea712cde3bc350"}]}},"nvd":{"publishedDate":"2019-12-04 19:15:00","lastModifiedDate":"2022-01-01 20:07:00","problem_types":["CWE-427"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.4},"severity":"MEDIUM","exploitabilityScore":3.4,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sony:catalyst_browse:*:*:*:*:*:*:*:*","versionEndIncluding":"2019.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sony:catalyst_production_suite:*:*:*:*:*:*:*:*","versionEndIncluding":"2019.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"19364","Ordinal":"161011","Title":"CVE-2019-19364","CVE":"CVE-2019-19364","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"19364","Ordinal":"1","NoteData":"A weak malicious user can escalate its privilege whenever CatalystProductionSuite.2019.1.exe (version 1.1.0.21) and CatalystBrowseSuite.2019.1.exe (version 1.1.0.21) installers run. The vulnerability is in the form of DLL Hijacking. The installers try to load DLLs that don’t exist from its current directory; by doing so, an attacker can quickly escalate its privileges.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"19364","Ordinal":"2","NoteData":"2019-12-04","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"19364","Ordinal":"3","NoteData":"2019-12-23","Type":"Other","Title":"Modified"}]}}}