The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade DSInternals.Common
to version 4.8 or higher.
Affected versions of this package are vulnerable to Information Exposure in the DSInternals.Common.Data.RoamedCredential.Save()
method, which incorrectly parses the msPKIAccountCredentials
LDAP attribute values. Consequently, a malicious actor would be able to modify the computer's file system where an application using this function is executed with administrative privileges.
Note: The vulnerability can be exploited only under the following circumstances:
An attacker can modify the msPKIAccountCredentials attribute
of a user account in Active Directory. This attribute is used by the Credential Roaming feature of Windows and each AD user can modify their own roamed credentials. AND
A 3rd party application uses the DSInternals.Common
library to export roamed credentials from Active Directory to a file system. AND
The application has administrative privileges on the local system.
The probability of any 3rd-party product using the DSInternals.Common
library being affected by this vulnerability is extremely low.