CERT-In Vulnerability Note
CIVN-2019-0194
Arbitrary Code Execution Vulnerability in Kaspersky Products
Original Issue Date:December 11, 2019
Severity Rating: MEDIUM
Software Affected
- Kaspersky Secure Connection prior to version 4.0 (2020) patch E.
- Kaspersky Internet Security prior to version 2020 patch E.
- Kaspersky Total Security prior to version 2020 patch E.
- Kaspersky Security Cloud prior to version 2020 patch E.
Overview
A vulnerability has been reported in Kaspersky Products, which could allow an attacker to execute arbitrary code on the targeted system.
Description
This vulnerability exists in Kaspersky Secure Connection VPN client as well other Kaspersky products which include this VPN client due to unsafe DLL loading and lack of signature verification. An attacker with Administrative privileges could exploit this vulnerability by placing a malicious DLL file into the products folder.
Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code on the targeted system.
Solution
Update to fixed versions as mentioned in the Kaspersky Advisory:
https://support.kaspersky.com/general/vulnerability.aspx?el=12430#021219
References
https://support.kaspersky.com/general/vulnerability.aspx?el=12430#021219
https://www.symantec.com/security-center/vulnerabilities/writeup/111033
https://safebreach.com/Post/Kaspersky-Secure-Connection-DLL-Preloading-and-Potential-Abuses-CVE-2019-15689
CVE Name
CVE-2019-15689
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|