7.2
CVSSv2

CVE-2022-0486

Published: 17/05/2022 Updated: 26/05/2022
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Improper file permissions in the CommandPost, Collector, Sensor, and Sandbox components of Fidelis Network and Deception enables an attacker with local, administrative access to the CLI to modify affected files and enable escalation of privileges equivalent to the root user. The vulnerability is present in Fidelis Network and Deception versions before 9.4.5. Patches and updates are available to address this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fidelissecurity deception

fidelissecurity network

Github Repositories

Fidelis Network and Deception - Insecure File Permissions Privilege Escalation - Multiple

Fidelis Network and Deception - CVE-2022-0486 - Insecure File Permissions Privilege Escalation - Multiple Releasability and Acknowledgements All exploits were approved for public release by the United States Government Special thanks to the servicemen and government liaisons tasked with approving the documentation for unlimited distribution Please refer to the following OTR n