Description
AnyDesk before 6.1.0 on Windows, when run in portable mode on a system where the attacker has write access to the application directory, allows this attacker to compromise a local user account via a read-only setting for a Trojan horse gcapi.dll file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-23154 | AnyDesk before 6.1.0 on Windows, when run in portable mode on a system where the attacker has write access to the application directory, allows this attacker to compromise a local user account via a read-only setting for a Trojan horse gcapi.dll file. |
References
| Link | Providers |
|---|---|
| https://anydesk.com/cve/2020-35483/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T17:02:07.980Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2020-35483
No data.
Status : Modified
Published: 2021-01-11T15:15:13.187
Modified: 2024-11-21T05:27:23.537
Link: CVE-2020-35483
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD