CVE-2013-1610:Unquoted Windows search path vulnerability in Symantec PGP Desktop and Symantec Encryption Desktop.

splash
Back

Description Preview

The vulnerability identified as CVE-2013-1610 exists in Symantec PGP Desktop versions 10.0.x through 10.2.x and Symantec Encryption Desktop version 10.3.0 before MP3. It allows local users to escalate privileges by placing a malicious application in the top-level directory of the %SYSTEMDRIVE%.

Overview

This vulnerability in Symantec encryption software allows local users to gain elevated privileges on the system by exploiting an unquoted Windows search path vulnerability in the RDDService component. By placing a Trojan horse application in the %SYSTEMDRIVE% top-level directory, an attacker can manipulate the search path to execute the malicious code with elevated privileges.

Remediation

To mitigate this vulnerability, Symantec recommends updating to the latest version of Symantec PGP Desktop or Symantec Encryption Desktop. Additionally, users should ensure that all software installations are quoted properly to prevent unauthorized applications from being executed with elevated privileges.

References

  1. SecurityFocus BID: 61489
  2. Symantec Security Advisory: Symantec Advisory

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Public Administration
    Public Administration
  2. Finance and Insurance
    Finance and Insurance
  3. Arts, Entertainment & Recreation
    Arts, Entertainment & Recreation
  4. Educational Services
    Educational Services
  5. Management of Companies & Enterprises
    Management of Companies & Enterprises
  6. Manufacturing
    Manufacturing
  7. Accommodation & Food Services
    Accommodation & Food Services
  8. Administrative, Support, Waste Management & Remediation Services
    Administrative, Support, Waste Management & Remediation Services
  9. Agriculture, Forestry Fishing & Hunting
    Agriculture, Forestry Fishing & Hunting
  10. Construction
    Construction
  11. Health Care & Social Assistance
    Health Care & Social Assistance
  12. Information
    Information
  13. Mining
    Mining
  14. Other Services (except Public Administration)
    Other Services (except Public Administration)
  15. Professional, Scientific, & Technical Services
    Professional, Scientific, & Technical Services
  16. Real Estate Rental & Leasing
    Real Estate Rental & Leasing
  17. Retail Trade
    Retail Trade
  18. Transportation & Warehousing
    Transportation & Warehousing
  19. Utilities
    Utilities
  20. Wholesale Trade
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background
Armis Vulnerability Intelligence Database