CVE-2022-27535 is a local privilege escalation vulnerability in Kaspersky VPN Secure Connection for Microsoft Windows.
The Synopsys Cybersecurity Research Center (CyRC) team has identified a local privilege escalation vulnerability in Kaspersky VPN Secure Connection for Microsoft Windows.
In the Support Tools part of the application, a regular user can use Delete service data and reports to remove a privileged folder.
Based on this capability, an attacker can leverage Arbitrary Folder Delete to SYSTEM EoP to gain SYSTEM privileges.
Publication of CVE-2022-27535 is expected soon from Kaspersky.
Kaspersky VPN Secure Connection 220.127.116.111 (h)
CVSS 3.1 base score: 7.8 (high)
CVSS 3.1 vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Upgrade to version 18.104.22.1683 or later.
Zeeshan Shaikh (@bugzzzhunter), is a researcher from the Synopsys Cybersecurity Research Center.
- March 9, 2022: Initial disclosure
- March 28, 2022: Kaspersky confirms vulnerability
- May 31, 2022: Kaspersky confirms fix has been released
- July 29, 2022: Fix validated by Zeeshan Shaikh
- August 4, 2022: Advisory published by Synopsys
FIRST.Org, Inc (FIRST) is a non-profit organization based out of US that owns and manages CVSS. It is not required to be a member of FIRST to utilize or implement CVSS but FIRST does require any individual or organization give appropriate attribution while using CVSS. FIRST also states that any individual or organization that publishes scores follow the guideline so that anyone can understand how the scare was calculated.
Learn more about vulnerabilities discovered and disclosed by CyRC
*** This is a Security Bloggers Network syndicated blog from Application Security Blog authored by Zeeshan Shaikh. Read the original post at: https://www.synopsys.com/blogs/software-security/cyrc-advisory-kasperksy-vpn-microsoft-windows/