|Vulnerability Type||CWE-65 Windows Hard Link
(leads to Command Injections / Local Privilege Escalation)
|Updated On||2019-10-28 (Initial Advisory)|
|Application||Goverlan Reach (Agent)|
|Affected Versions||Goverlan Reach Console v9.20 and earlier
Goverlan Client Agent v9.20.02 and earlier
|Vulnerability Status||Update Released|
A vulnerability has been reported which allows a malicious actor to generate arbitrary files in any location within the local system, including within protected areas. This exploit can be used in conjunction with a DLL hijacking exploit and result in privilege escalation.
|Vulnerability Type||Remotely Exploitable||Impact|
|Command Injection||No||Possible Local Code Execution|
|Local Privilege Escalation||No||Possible Escalation from Standard User to Local Administrative Privileges|
This exploit is exposed by the Goverlan Agent process: GovAgentx64.exe and GovAgent.exe versions 9.20.02 and earlier.
These Goverlan Client Agent are distributed on remote machine via the Goverlan Reach Console and Goverlan Reach Server versions 9.20 and 3.20 and earlier respectively.
|Goverlan Reach Console v9.20.XX and earlier||Update to v9.50 or later|
|Goverlan Reach Server v3.20.XX and earlier||Update to v3.50 or later|
|Goverlan Client Agent v9.20.02||Update to v9.20.50 or later|
For further information about this security advisory, or to send us a security alert, please contact security(@)goverlan.com.