{"api_version":"1","generated_at":"2026-04-23T06:19:27+00:00","cve":"CVE-2019-6145","urls":{"html":"https://cve.report/CVE-2019-6145","api":"https://cve.report/api/cve/CVE-2019-6145.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-6145","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-6145"},"summary":{"title":"CVE-2019-6145","description":"Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs for finding this vulnerability and for reporting it to us.","state":"PUBLIC","assigner":"psirt@forcepoint.com","published_at":"2019-09-20 20:15:00","updated_at":"2022-04-18 16:15:00"},"problem_types":["CWE-428"],"metrics":[],"references":[{"url":"https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145","name":"https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"Forcepoint VPN Client for Windows - Unquoted Search Path and Potential Abuses (CVE-2019-6145)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://help.forcepoint.com/security/CVE/CVE-2019-6145.html","name":"https://help.forcepoint.com/security/CVE/CVE-2019-6145.html","refsource":"CONFIRM","tags":[],"title":"Security Advisory: Unquoted search path vulnerability in Forcepoint VPN Client for Windows (CVE-2019-6145)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.forcepoint.com/KBArticle?id=000017525","name":"https://support.forcepoint.com/KBArticle?id=000017525","refsource":"CONFIRM","tags":["Mitigation","Vendor Advisory"],"title":"KB Article | Forcepoint Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-6145","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6145","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"6145","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"forcepoint","cpe5":"vpn_client","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6145","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"forcepoint","cpe5":"vpn_client","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2019-6145","ASSIGNER":"psirt@forcepoint.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Forcepoint","product":{"product_data":[{"product_name":"Forcepoint VPN Client for Windows","version":{"version_data":[{"version_value":"versions earlier than 6.6.1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Unquoted search path vulnerability"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145","url":"https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145"},{"refsource":"CONFIRM","name":"https://help.forcepoint.com/security/CVE/CVE-2019-6145.html","url":"https://help.forcepoint.com/security/CVE/CVE-2019-6145.html"}]},"description":{"description_data":[{"lang":"eng","value":"Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs for finding this vulnerability and for reporting it to us."}]}},"nvd":{"publishedDate":"2019-09-20 20:15:00","lastModifiedDate":"2022-04-18 16:15:00","problem_types":["CWE-428"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:forcepoint:vpn_client:*:*:*:*:*:windows:*:*","versionEndExcluding":"6.6.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"6145","Ordinal":"143816","Title":"CVE-2019-6145","CVE":"CVE-2019-6145","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"6145","Ordinal":"1","NoteData":"Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs for finding this vulnerability and for reporting it to us.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"6145","Ordinal":"2","NoteData":"2019-09-20","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"6145","Ordinal":"3","NoteData":"2021-09-10","Type":"Other","Title":"Modified"}]}}}