CVE-2019-18631

EUVD-2019-8354
The Windows component of Centrify Authentication and Privilege Elevation Services 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.5.0, 3.5.1 (18.8), 3.5.2 (18.11), and 3.6.0 (19.6) does not properly handle an unspecified exception during use of partially trusted assemblies to serialize input data, which allows attackers to execute arbitrary code inside the Centrify process via (1) a crafted application that makes a pipe connection to the process and sends malicious serialized data or (2) a crafted Microsoft Management Console snap-in control file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
Affected Products (NVD)
VendorProductVersion
centrifyauthentication_service
3.4.0
centrifyauthentication_service
3.4.1
centrifyauthentication_service
3.4.2
centrifyauthentication_service
3.4.3
centrifyauthentication_service
3.5.0
centrifyauthentication_service
3.5.1
centrifyauthentication_service
3.5.2
centrifyauthentication_service
3.6.0
centrifyprivilege_elevation_service
3.4.0
centrifyprivilege_elevation_service
3.4.1
centrifyprivilege_elevation_service
3.4.2
centrifyprivilege_elevation_service
3.4.3
centrifyprivilege_elevation_service
3.5.0
centrifyprivilege_elevation_service
3.5.1
centrifyprivilege_elevation_service
3.5.2
centrifyprivilege_elevation_service
3.6.0
𝑥
= Vulnerable software versions