Druide Antidote RX, HD, 8 before 8.05.2287, 9 before 9.5.3937 and 10 before 10.1.2147 allows remote attackers to steal NTLM hashes or perform SMB relay attacks upon a direct launch of the product, or upon an indirect launch via an integration such as Chrome, Firefox, Word, Outlook, etc. This occurs because the product attempts to access a share with the PLUG-INS subdomain name; an attacker may be able to use Active Directory Domain Services to register that name.
References
Link | Resource |
---|---|
https://gosecure.net/2019/02/20/abusing-unsafe-defaults-in-active-directory/ | Exploit Third Party Advisory |
https://www.druide.com/en/news/security-improvement-antidote-windows | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-03-04 08:29
Updated : 2020-08-24 17:37
NVD link : CVE-2019-9565
Mitre link : CVE-2019-9565
CVE.ORG link : CVE-2019-9565
JSON object : View
Products Affected
druide
- antidote
CWE