Risk | Low |
Patch available | NO |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2020-28921 CVE-2020-28922 |
CWE-ID | CWE-269 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
PC Analyser Other software / Other software solutions |
Vendor | Devid Espenschied |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU48730
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-28921
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges.
The vulnerability exists due to improper privilege management when the PCADRVX64.SYS kernel driver exposes IOCTL functionality. A local user can execute arbitrary code and escalate privileges.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsPC Analyser: 4.10
CPE2.3 External linkshttp://www.pcanalyser.de/index.php/historie/
http://github.com/eset/vulnerability-disclosures
http://github.com/eset/vulnerability-disclosures/blob/master/CVE-2020-28921/CVE-2020-28921.md
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU48731
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-28922
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges.
The vulnerability exists due to improper privilege management when the PCADRVX64.SYS kernel driver exposes IOCTL functionality. A local user can execute arbitrary code and escalate privileges.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsPC Analyser: 4.10
CPE2.3 External linkshttp://www.pcanalyser.de/index.php/historie/
http://github.com/eset/vulnerability-disclosures
http://github.com/eset/vulnerability-disclosures/blob/master/CVE-2020-28922/CVE-2020-28922.md
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.