7.2
CVSSv2

CVE-2018-18435

Published: 21/03/2019 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

KioWare Server version 4.9.6 and older installs by default to "C:\kioware_com" with weak folder permissions granting any user full permission "Everyone: (F)" to the contents of the directory and it's sub-folders. In addition, the program installs a service called "KWSService" which runs as "Localsystem", this will allow any user to escalate privileges to "NT AUTHORITY\SYSTEM" by substituting the service's binary with a malicious one.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kioware kioware server

Exploits

# Exploit Title : KioWare Server Version 496 - Weak Folder Permissions Privilege Escalation # Date : 10/12/2018 # Exploit Author : Hashim Jawad - @ihack4falafel # Vendor Homepage : wwwkiowarecom/ # Tested on : Windows Server 2016 Standard (x64) # CVE : CVE-2018-18435 Description: ====== ...
KioWare Server version 496 suffers from a weak folder privilege escalation vulnerability ...