Privilege Escalation in SailPoint Desktop Password Reset by SailPoint
CVE-2019-12889
Key Information:
- Vendor
Sailpoint
- Status
- Vendor
- CVE Published:
- 20 August 2019
Badges
What is CVE-2019-12889?
An unprivileged user with local access to the Windows logon screen can exploit a vulnerability in SailPoint Desktop Password Reset version 7.2 to escalate their privileges to NT AUTHORITY\System. To perform the attack, the user must first disconnect the computer from the local network and connect it to an externally accessible network. Subsequently, by triggering the password-reset functionality, they can access a web browser. If they navigate to a site capable of invoking local Windows system functions, such as uploading files, it can reveal the local file system, allowing them to launch a command shell with elevated privileges.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.