CVE-2019-15689 vulnerability in Kaspersky Products
Published on December 2, 2019
Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud prior to version 2020 patch E have bug that allows a local user to execute arbitrary code via execution compromised file placed by an attacker with administrator rights. No privilege escalation. Possible whitelisting bypass some of the security products
Products Associated with CVE-2019-15689
Want to know whenever a new CVE is published for Kaspersky products? stack.watch will email you.
Affected Versions
Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud Version prior to version 2020 patch E is affected by CVE-2019-15689Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.