Description
Unsafe usage of .NET deserialization in Named Pipe message processing allows privilege escalation to NT AUTHORITY\SYSTEM for a local attacker. Affected product is TinyWall, all versions up to and including 2.1.12. Fixed in version 2.1.13.
Exploits (1)
References (2)
Core 2
Core References
Third Party Advisory x_refsource_misc
https://www.wilderssecurity.com/threads/beta-testing-tinywall.309739/page-62#post-2882843
Third Party Advisory x_refsource_misc
https://gist.github.com/pylorak/7df52c9325614676e07782dbe4e81582
Scores
CVSS v3
7.8
EPSS
0.0084
EPSS Percentile
74.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-502
Status
published
Products (1)
tinywall/tinywall
< 2.1.13
Published
Dec 30, 2019
Tracked Since
Feb 18, 2026