CVE-2019-1424Path Traversal in Microsoft Windows

CWE-22Path Traversal11 documents9 sources
Severity
8.1HIGHNVD
EPSS
3.2%
top 12.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 12
Latest updateMay 24

Description

A security feature bypass vulnerability exists when Windows Netlogon improperly handles a secure communications channel, aka 'NetLogon Security Feature Bypass Vulnerability'.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages7 packages

CVEListV5microsoft/windows18 versions+17
NVDmicrosoft/windowsr2, 1803, 1903+2
NVDmicrosoft/windows_105 versions+4
CVEListV5microsoft/windows_server17 versions+16

Patches

🔴Vulnerability Details

2
GHSA
GHSA-vp93-jg87-jfmh: A security feature bypass vulnerability exists when Windows Netlogon improperly handles a secure communications channel, aka 'NetLogon Security Featur2022-05-24
CVEList
CVE-2019-1424: A security feature bypass vulnerability exists when Windows Netlogon improperly handles a secure communications channel, aka 'NetLogon Security Featur2019-11-12

📋Vendor Advisories

2
Microsoft
NetLogon Security Feature Bypass Vulnerability2019-11-12
Red Hat
jenkins: Arbitrary file write vulnerability using file parameter definitions (SECURITY-1424)2019-07-17

🕵️Threat Intelligence

3
Tenable
CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller2020-09-14
Talos
Microsoft Patch Tuesday — Nov. 2019: Vulnerability disclosures and Snort coverage2019-11-12
Talos
Microsoft Patch Tuesday — Nov. 2019: Vulnerability disclosures and Snort coverage2019-11-12

💬Community

1
Bugzilla
CVE-2019-10352 jenkins: Arbitrary file write vulnerability using file parameter definitions (SECURITY-1424)2019-07-17
CVE-2019-1424 — Path Traversal in Microsoft Windows | cvebase