Vulnerability Name: | CVE-2022-27535 (CCN-232911) | ||||||||||||
Assigned: | 2022-03-21 | ||||||||||||
Published: | 2022-03-21 | ||||||||||||
Updated: | 2022-08-15 | ||||||||||||
Summary: | Kaspersky VPN Secure Connection for Windows version up to 21.5 was vulnerable to arbitrary file deletion via abuse of its 'Delete All Service Data And Reports' feature by the local authenticated attacker. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.3 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.2 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:C/A:P)
| ||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-27535 Source: XF Type: UNKNOWN kaspersky-cve202227535-sec-bypass(232911) Source: MISC Type: Vendor Advisory https://forum.kaspersky.com/topic/kaspersky-statement-on-cve-2022-27535-26742/ Source: CCN Type: Kaspersky Web site VPN Secure Connection for Windows Source: MISC Type: Vendor Advisory https://support.kaspersky.com/general/vulnerability.aspx?el=12430#050822 Source: MISC Type: Third Party Advisory https://www.synopsys.com/blogs/software-security/cyrc-advisory-kasperksy-vpn-microsoft-windows/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |