7.8
CVSSv3

CVE-2019-18631

Published: 05/11/2019 Updated: 13/09/2021
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Windows component of Centrify Authentication and Privilege Elevation Services 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.5.0, 3.5.1 (18.8), 3.5.2 (18.11), and 3.6.0 (19.6) does not properly handle an unspecified exception during use of partially trusted assemblies to serialize input data, which allows malicious users to execute arbitrary code inside the Centrify process via (1) a crafted application that makes a pipe connection to the process and sends malicious serialized data or (2) a crafted Microsoft Management Console snap-in control file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

centrify authentication_service 3.4.0

centrify authentication_service 3.4.1

centrify authentication_service 3.4.2

centrify authentication_service 3.4.3

centrify authentication_service 3.5.0

centrify authentication_service 3.5.1

centrify authentication_service 3.5.2

centrify authentication_service 3.6.0

centrify privilege_elevation_service 3.4.0

centrify privilege_elevation_service 3.4.1

centrify privilege_elevation_service 3.4.2

centrify privilege_elevation_service 3.4.3

centrify privilege_elevation_service 3.5.0

centrify privilege_elevation_service 3.5.1

centrify privilege_elevation_service 3.5.2

centrify privilege_elevation_service 3.6.0