ID

VAR-202008-1209


CVE

CVE-2020-6012


TITLE

ZoneAlarm Anti-Ransomware Link Interpretation Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-008953

DESCRIPTION

ZoneAlarm Anti-Ransomware before version 1.0.713 copies files for the report from a directory with low privileges. A sophisticated timed attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links. This allows an unprivileged user to enable escalation of privilege via local access. ZoneAlarm Anti-Ransomware Exists in a link interpretation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Check Point Software Technologies ZoneAlarm Anti-Ransomware is a set of anti-ransomware from Check Point Software Technologies in the United States. A postlinking vulnerability exists in Check Point Software Technologies ZoneAlarm Anti-Ransomware versions prior to 1.0.713. The vulnerability is caused by the program copying files from low-privileged directories

Trust: 1.71

sources: NVD: CVE-2020-6012 // JVNDB: JVNDB-2020-008953 // VULHUB: VHN-184137

AFFECTED PRODUCTS

vendor:checkpointmodel:zonealarm anti-ransomwarescope:ltversion:1.0.713

Trust: 1.0

vendor:check pointmodel:zonealarm anti-ransomwarescope:eqversion:1.0.713

Trust: 0.8

sources: JVNDB: JVNDB-2020-008953 // NVD: CVE-2020-6012

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-6012
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-008953
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202008-108
value: HIGH

Trust: 0.6

VULHUB: VHN-184137
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-6012
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-008953
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-184137
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-6012
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.4
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-008953
baseSeverity: HIGH
baseScore: 7.0
vectorString: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-184137 // JVNDB: JVNDB-2020-008953 // CNNVD: CNNVD-202008-108 // NVD: CVE-2020-6012

PROBLEMTYPE DATA

problemtype:CWE-59

Trust: 1.9

sources: VULHUB: VHN-184137 // JVNDB: JVNDB-2020-008953 // NVD: CVE-2020-6012

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202008-108

TYPE

post link

Trust: 0.6

sources: CNNVD: CNNVD-202008-108

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-008953

PATCH

title:ZoneAlarm Anti-Ransomwareurl:https://www.zonealarm.com/anti-ransomware/release-history

Trust: 0.8

title:ZoneAlarm Extreme Securityurl:https://www.zonealarm.com/software/extreme-security/release-history

Trust: 0.8

title:Check Point Software Technologies ZoneAlarm Anti-Ransomware Post-link vulnerability fixesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=125827

Trust: 0.6

sources: JVNDB: JVNDB-2020-008953 // CNNVD: CNNVD-202008-108

EXTERNAL IDS

db:NVDid:CVE-2020-6012

Trust: 2.5

db:JVNDBid:JVNDB-2020-008953

Trust: 0.8

db:CNNVDid:CNNVD-202008-108

Trust: 0.7

db:VULHUBid:VHN-184137

Trust: 0.1

sources: VULHUB: VHN-184137 // JVNDB: JVNDB-2020-008953 // CNNVD: CNNVD-202008-108 // NVD: CVE-2020-6012

REFERENCES

url:https://danishcyberdefence.dk/blog/zonealarm-check-point

Trust: 1.7

url:https://www.zonealarm.com/anti-ransomware/release-history

Trust: 1.7

url:https://www.zonealarm.com/software/extreme-security/release-history

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-6012

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6012

Trust: 0.8

url:https://vigilance.fr/vulnerability/check-point-zonealarm-anti-ransomware-privilege-escalation-33408

Trust: 0.6

sources: VULHUB: VHN-184137 // JVNDB: JVNDB-2020-008953 // CNNVD: CNNVD-202008-108 // NVD: CVE-2020-6012

SOURCES

db:VULHUBid:VHN-184137
db:JVNDBid:JVNDB-2020-008953
db:CNNVDid:CNNVD-202008-108
db:NVDid:CVE-2020-6012

LAST UPDATE DATE

2024-11-23T22:55:05.179000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-184137date:2023-01-31T00:00:00
db:JVNDBid:JVNDB-2020-008953date:2020-10-08T00:00:00
db:CNNVDid:CNNVD-202008-108date:2023-02-01T00:00:00
db:NVDid:CVE-2020-6012date:2024-11-21T05:34:58.813

SOURCES RELEASE DATE

db:VULHUBid:VHN-184137date:2020-08-04T00:00:00
db:JVNDBid:JVNDB-2020-008953date:2020-10-08T00:00:00
db:CNNVDid:CNNVD-202008-108date:2020-08-04T00:00:00
db:NVDid:CVE-2020-6012date:2020-08-04T14:15:11.927