Vulnerability issues found in Forcepoint VPN Client

Nadvirna Overview :
Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs for finding this vulnerability and for reporting it to us.
Pregabalin no prescription Affected Product(s) :
  • Forcepoint VPN Client for Windows versions lower than 6.6.1
Vulnerability Details :
CVE ID : CVE-2019-6145
Forcepoint has reserved CVE-2019-6145 to identify and track this issue with an assigned CVSSv3 Base Score of 6.5 (Medium). [CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H]

Solution : To fix this vulnerability, upgrade to VPN Client for Windows version 6.6.1 or higher.

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2023-5288 : SICK SIM1012 Access Control

CVE-2023-5288 : SICK SIM1012 Access Control

Description A remote unauthorized attacker may connect to the SIM1012, interact with the device and change configuration settings. The adversary

CVE-2023-44466 : Linux Kernel up to 6.4.4 Ceph File System net/ceph/messenger_v2.c Buffer Overflow

CVE-2023-44466 : Linux Kernel up to 6.4.4 Ceph File System net/ceph/messenger_v2.c Buffer Overflow

Description An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading

CVE-2023-20252 : CISCO CATALYST SD-WAN MANAGER SAML API IMPROPER AUTHENTICATION

CVE-2023-20252 : CISCO CATALYST SD-WAN MANAGER SAML API IMPROPER AUTHENTICATION

Description A vulnerability in the Security Assertion Markup Language (SAML) APIs of Cisco Catalyst SD-WAN Manager Software could allow an