641
VMScore

CVE-2020-5752

Published: 21/05/2020 Updated: 29/11/2022
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Relative path traversal in Druva inSync Windows Client 6.6.3 allows a local, unauthenticated malicious user to execute arbitrary operating system commands with SYSTEM privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

druva insync client 6.6.3

Exploits

Druva inSync Windows Client version 663 suffers from a local privilege escalation vulnerability ...
Druva inSync Windows Client version 663 suffers from a local privilege escalation vulnerability ...

Github Repositories

Druva inSync Windows Client 6.6.3 - Local Privilege Escalation (PowerShell) RCE

CVE-2020-5752: Druva-inSync-Windows-Client-663---Local-Privilege-Escalation-PowerShell- Druva inSync Windows Client 663 - Local Privilege Escalation (PowerShell) Modified to get Reverse Shell with system privileges