Categories
Knowledge Support Support exacqVision Enterprise Categories Products

Modifying ESM Security Access

Tyco Security Solutions has confirmed a vulnerability in the exacqVision Enterprise System Manager (ESM) v5.12.2 application whereby unauthorized privilege escalation can be achieved and providing guidance on mitigation actions to avoid a potential exploit.

<br>

Scope:  This vulnerability impacts exacqVision ESM v5.12.2 and all prior versions of ESM running on a Windows operating system (except Windows Server). This issue does not impact Linux deployments with permissions that are not inherited from the root directory.

<br>

Mitigation:  The following mitigating steps are recommended for Windows 10 Desktop OS. Other versions of Windows may have different nomenclature, but the same mitigating steps are recommended.

<br>

Launch a command prompt with Administrator privileges, then run the following 4 commands sequentially:

  • cacls C:\exacqVisionESM /e /R “Authenticated Users”
  • cacls C:\exacqVisionESM\uninstall.exe /e /R “Authenticated Users”
  • cacls C:\exacqVisionESM\EnterpriseSystemManager /e /T /R “Authenticated Users”
  • cacls C:\exacqVisionESM\apache_solr /e /T /R “Authenticated Users”

<br>

Open the ‘Services’ applet and restart all of the following:

  • ESMImporter
  • ESMDatarolloff
  • ESMSendemail
  • ESMWebservice
  • solrJetty
  • solrApache

<br>

Fix:  Tyco Security Solutions is working on a fix that will be incorporated into a future version of the exacqVision ESM that will not require the foregoing manual mitigation process to be executed.

<br>

References: CPP-PSA-2019-01 – Please visit the Tyco Security Solutions, Cyber Protection website to register for and download security advisories.

<br>

Modifying-ESM-Security-Access.pdf