{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T05:42:25.736","vulnerabilities":[{"cve":{"id":"CVE-2022-25294","sourceIdentifier":"cve@mitre.org","published":"2022-03-10T17:47:07.150","lastModified":"2024-11-21T06:51:56.603","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Proofpoint Insider Threat Management Agent for Windows relies on an inherently dangerous function that could enable an unprivileged local Windows user to run arbitrary code with SYSTEM privileges. All versions prior to 7.12.1 are affected. Agents for MacOS and Linux and Cloud are unaffected. Proofpoint has released fixed software version 7.12.1. The fixed software versions are available through the customer support portal."},{"lang":"es","value":"Proofpoint Insider Threat Management Agent para Windows es basado en una función inherentemente peligrosa que podría permitir a un usuario local de Windows no privilegiado ejecutar código arbitrario con privilegios SYSTEM. Todas las versiones anteriores a 7.12.1 están afectadas. Los agentes para MacOS y Linux y Cloud no están afectados. Proofpoint ha publicado la versión de software corregida 7.12.1. Las versiones de software corregidas están disponibles mediante el portal de soporte al cliente"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:proofpoint:insider_threat_management:*:*:*:*:*:windows:*:*","versionEndExcluding":"7.12.1","matchCriteriaId":"0A7095F6-192A-4D1D-9ABC-1403713FFC4D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2022-0001","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2022-0001","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}