Vulnerability Details CVE-2020-14418
A TOCTOU vulnerability exists in madCodeHook before 2020-07-16 that allows local attackers to elevate their privileges to SYSTEM. This occurs because path redirection can occur via vectors involving directory junctions.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 20.4%
CVSS Severity
CVSS v3 Score 7.0
CVSS v2 Score 6.9
Products affected by CVE-2020-14418
-
cpe:2.3:a:cisco:advanced_malware_protection:-
-
cpe:2.3:a:cisco:advanced_malware_protection:3.1(10)
-
cpe:2.3:a:cisco:advanced_malware_protection:3.1(15)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.0(0)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.0(1)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.0(2)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.1(0)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.1(1)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.1(4)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.2(0)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.2(1)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.3(0)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.3(1)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.4(0)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.4(1)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.4(2)
-
cpe:2.3:a:cisco:advanced_malware_protection:4.4(4)
-
cpe:2.3:a:cisco:advanced_malware_protection:5.0(1)
-
cpe:2.3:a:cisco:advanced_malware_protection:5.0(3)
-
cpe:2.3:a:cisco:advanced_malware_protection:5.0(5)
-
cpe:2.3:a:cisco:advanced_malware_protection:5.0(7)
-
cpe:2.3:a:cisco:advanced_malware_protection:5.0(9)
-
cpe:2.3:a:cisco:advanced_malware_protection:5.1(1)
-
cpe:2.3:a:cisco:advanced_malware_protection:5.1(11)
-
cpe:2.3:a:cisco:advanced_malware_protection:5.1(13)
-
cpe:2.3:a:cisco:advanced_malware_protection:5.1(3)
-
cpe:2.3:a:cisco:advanced_malware_protection:5.1(5)
-
cpe:2.3:a:cisco:advanced_malware_protection:5.1(7)
-
cpe:2.3:a:cisco:advanced_malware_protection:5.1(9)
-
cpe:2.3:a:cisco:advanced_malware_protection:6.0(1)
-
cpe:2.3:a:madshi:madcodehook:-
-
cpe:2.3:a:madshi:madcodehook:3.1.0
-
cpe:2.3:a:madshi:madcodehook:3.1.10
-
cpe:2.3:a:madshi:madcodehook:3.1.11
-
cpe:2.3:a:madshi:madcodehook:3.1.12
-
cpe:2.3:a:madshi:madcodehook:3.1.14
-
cpe:2.3:a:madshi:madcodehook:3.1.15
-
cpe:2.3:a:madshi:madcodehook:3.1.16
-
cpe:2.3:a:madshi:madcodehook:3.1.17
-
cpe:2.3:a:madshi:madcodehook:3.1.18
-
cpe:2.3:a:madshi:madcodehook:3.1.2
-
cpe:2.3:a:madshi:madcodehook:3.1.3
-
cpe:2.3:a:madshi:madcodehook:3.1.4
-
cpe:2.3:a:madshi:madcodehook:3.1.5
-
cpe:2.3:a:madshi:madcodehook:3.1.6
-
cpe:2.3:a:madshi:madcodehook:3.1.7
-
cpe:2.3:a:madshi:madcodehook:3.1.8
-
cpe:2.3:a:madshi:madcodehook:3.1.9
-
cpe:2.3:a:madshi:madcodehook:4.0.1
-
cpe:2.3:a:madshi:madcodehook:4.0.2
-
cpe:2.3:a:madshi:madcodehook:4.0.3
-
cpe:2.3:a:madshi:madcodehook:4.0.4
-
cpe:2.3:a:madshi:madcodehook:4.0.5
-
cpe:2.3:a:madshi:madcodehook:4.1.0
-
cpe:2.3:a:madshi:madcodehook:4.1.1
-
cpe:2.3:a:madshi:madcodehook:4.1.2
-
cpe:2.3:a:morphisec:unified_threat_prevention_platform:-
-
cpe:2.3:a:morphisec:unified_threat_prevention_platform:4.0