Metrics
Affected Vendors & Products
Link | Providers |
---|---|
https://forescout.my.site.com/support/s/article/ |
![]() ![]() |
Thu, 15 May 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Forescout
Forescout secureconnector Microsoft Microsoft windows |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:forescout:secureconnector:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Forescout
Forescout secureconnector Microsoft Microsoft windows |
|
Metrics |
cvssV3_1
|
Tue, 13 May 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 13 May 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 13 May 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 13 May 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A remote code execution vulnerability exists in the Windows agent component of SecureConnector due to improper access controls on a named pipe. The pipe is accessible to the Everyone group and does not restrict remote connections, allowing any network-based attacker to connect without authentication. By interacting with this pipe, an attacker can redirect the agent to communicate with a rogue server that can issue commands via the SecureConnector Agent. This does not impact Linux or OSX Secure Connector. | |
Title | Remote Code Execution in Windows Secure Connector/ HPS Inspection Engine via Insecure Named Pipe Access | |
Weaknesses | CWE-276 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Forescout
Published:
Updated: 2025-05-13T18:35:12.394Z
Reserved: 2025-05-13T17:34:31.059Z
Link: CVE-2025-4660

Updated: 2025-05-13T18:35:08.996Z

Status : Analyzed
Published: 2025-05-13T18:15:41.843
Modified: 2025-05-15T18:38:32.803
Link: CVE-2025-4660

No data.