Macrium Reflect 7.2.x/7.3.x < 7.3.5281 Privilege Escalation

high Nessus Plugin ID 142032

Synopsis

Macrium Reflect installed on the remote Windows host is affected by a privilege escalation vulnerability.

Description

The version of Macrium Reflect installed on the remote Windows host is 7.2.x or 7.3.x prior to version 7.3.5281.
It is, therefore, affected by a privilege escalation vulnerability related to the OpenSSL component. An unprivileged Windows user can exploit this, by creating the appropriate path to a specially-crafted openssl.cnf in order to execute arbitrary code with SYSTEM privileges.

Note that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Macrium Reflect version 7.3.5281 or later.

See Also

https://www.kb.cert.org/vuls/id/760767

https://updates.macrium.com/reflect/v7/v7.3.5281/details7.3.5281.htm

Plugin Details

Severity: High

ID: 142032

File Name: macrium_reflect_7_3_5281.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 10/29/2020

Updated: 4/3/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-10143

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:macrium:reflect

Required KB Items: installed_sw/Macrium Reflect, SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Patch Publication Date: 10/26/2020

Vulnerability Publication Date: 10/26/2020

Reference Information

CVE: CVE-2020-10143

IAVB: 2020-B-0062