{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T20:12:11.224","vulnerabilities":[{"cve":{"id":"CVE-2020-13173","sourceIdentifier":"security@teradici.com","published":"2020-05-28T22:15:10.803","lastModified":"2024-11-21T05:00:48.090","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Initialization of the pcoip_credential_provider in Teradici PCoIP Standard Agent for Windows and PCoIP Graphics Agent for Windows versions 19.11.1 and earlier creates an insecure named pipe, which allows an attacker to intercept sensitive information or possibly elevate privileges via pre-installing an application which acquires that named pipe."},{"lang":"es","value":"La inicialización de pcoip_credential_provider en Teradici PCoIP Standard Agent para Windows y PCoIP Graphics Agent para Windows versiones 19.11.1 y anteriores, crea una tubería nombrada de forma no segura, que permite a un atacante interceptar información confidencial o posiblemente elevar privilegios mediante la preinstalación de una aplicación que obtiene que tubería nombró."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-362"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:teradici:pcoip_graphics_agent:*:*:*:*:*:windows:*:*","versionEndIncluding":"19.11.1","matchCriteriaId":"E60DA7DF-E802-4CDB-A7CD-C6CE14DE4A35"},{"vulnerable":true,"criteria":"cpe:2.3:a:teradici:pcoip_standard_agent:*:*:*:*:*:windows:*:*","versionEndIncluding":"19.11.1","matchCriteriaId":"AA6F3560-2CFD-4B73-8800-A9FE3B1AFBBE"}]}]}],"references":[{"url":"https://advisory.teradici.com/security-advisories/55/","source":"security@teradici.com","tags":["Vendor Advisory"]},{"url":"https://advisory.teradici.com/security-advisories/55/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}