Panda AdminSecure Communications Agent < Directory Traversal

Critical Nessus Plugin ID 70683


The remote Windows host contains an application that is affected by a directory traversal vulnerability.


The Panda AdminSecure Communications Agent software, which is used for centralized management of Panda Antivirus, installed on the remote Windows host contains a flaw in the handling of MESSAGE_FROM_REMOTE messages. The software does not properly sanitize inputs, allowing an attacker to craft a special message that allows traversing outside of a restricted path. This may allow a remote attacker to overwrite arbitrary files and execute remote code with SYSTEM privileges.


Upgrade to Panda AdminSecure hotfix 4_50_00_0032 or later and update all connected agents.

See Also

Plugin Details

Severity: Critical

ID: 70683

File Name: panda_pagent_4_50_0_10.nasl

Version: $Revision: 1.1 $

Type: local

Agent: windows

Family: Windows

Published: 2013/10/29

Modified: 2013/10/29

Dependencies: 10456, 13855

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:pandasecurity:panda_antivirus

Required KB Items: SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/10/16

Vulnerability Publication Date: 2013/10/16

Reference Information

BID: 63195

OSVDB: 98635