Multiple files and folders in Utimaco SecurityServer 4.20.0.4 and 4.31.1.0. are installed with Read/Write permissions for authenticated users, which allows for binaries to be manipulated by non-administrator users. Additionally, entries are made to the PATH environment variable which, in conjunction with these weak permissions, could enable an attacker to perform a DLL hijacking attack.
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Link | Tags |
---|---|
https://hsm.utimaco.com/products-hardware-security-modules/general-purpose-hsm/ | exploit vendor advisory |
https://secureyourit.co.uk/wp/2021/03/13/utimaco-cve-2020-26155/ | third party advisory |