| |
Vulnerability CVE-2018-11134
Published: 2018-05-31
Description: |
In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A low-privilege user could abuse this feature by changing the password of the 'kace_support' account, which comes disabled by default but has full sudo privileges. |
Type:
CWE-640 (Weak Password Recovery Mechanism for Forgotten Password)
CVSS2 => (AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
9/10 |
10/10 |
8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
Complete |
Complete |
Complete |
References: |
https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|