CVE-2018-18435
HIGHKioware Server < 4.9.6 - Incorrect Permission Assignment
Title source: ruleDescription
KioWare Server version 4.9.6 and older installs by default to "C:\kioware_com" with weak folder permissions granting any user full permission "Everyone: (F)" to the contents of the directory and it's sub-folders. In addition, the program installs a service called "KWSService" which runs as "Localsystem", this will allow any user to escalate privileges to "NT AUTHORITY\SYSTEM" by substituting the service's binary with a malicious one.
Exploits (1)
References (5)
Core 5
Core References
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/151031/KioWare-Server-4.9.6-Privilege-Escalation.html
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/46093/
Patch, Vendor Advisory x_refsource_confirm
https://m.kioware.com/news/kioware-press-releases/kioware_server_security_patch_update
Patch, Vendor Advisory x_refsource_confirm
https://www.kioware.com/patch.aspx
Various Sources x_refsource_misc
https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-002.md
Scores
CVSS v3
7.8
EPSS
0.0049
EPSS Percentile
65.8%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-732
Status
published
Products (1)
kioware/kioware_server
< 4.9.6
Published
Mar 21, 2019
Tracked Since
Feb 18, 2026