A security vulnerability in the exchange of information through Windows Named Pipes has been discovered in PCoIP Standard Agent for Windows and PCoIP Graphics Agent for Windows, versions 19.11.1 and earlier.
When affected versions of a PCoIP Agent for Windows are running, a named pipe is created by the PCoIP Agent. An attacker could pre-install an application which acquires that named pipe prior to the initialization of the
pcoip_credential_provider. This would allow the interception of sensitive information. Additionally, if the user account had windows impersonation enabled, then the attacker could elevate privilege to execute as Windows System.
Update the PCoIP Agent for Windows to 19.11.2 (or later) or the 2.7.9 patch.
There are no workarounds that address this vulnerability. To mitigate the vulnerability, update the PCoIP Agent for Windows to 19.11.2 (or later) or the 2.7.9 patch.
Initialization of the pcoip_credential_provider in Teradici PCoIP Standard Agent for Windows and PCoIP Graphics Agent for Windows versions 19.11.1 and earlier creates an insecure named pipe, which allows an attacker to intercept sensitive information or possibly elevate privileges via pre-installing an application which acquires that named pipe.
Vulnerability classification has been performed using the CVSSv3 scoring system. The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.
28 May 2020: Initial Publication
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. TERADICI RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.