2 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

BeyondTrust Privileged Remote Access (PRA) versions 22.2.x to 22.4.x are vulnerable to a local authentication bypass. Attackers can exploit a flawed secret verification process in the BYOT shell jump sessions, allowing unauthorized access to jump items by guessing only the first character of the secret. Las versiones 22.2.x a 22.4.x de BeyondTrust Privileged Remote Access (PRA) son vulnerables a una omisión de autenticación local. Los atacantes pueden aprovechar un proceso de verificación de secretos defectuoso en las sesiones de salto del shell BYOT, lo que permite el acceso no autorizado a elementos de salto adivinando solo el primer carácter del secreto. • https://www.compass-security.com/fileadmin/Research/Advisories/2023_03_CSNC-2022-018_PRA_Privilege_Escalation.txt • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) versions 23.2.1 and 23.2.2 contain a command injection vulnerability which can be exploited through a malicious HTTP request. Successful exploitation of this vulnerability can allow an unauthenticated remote attacker to execute underlying operating system commands within the context of the site user. This issue is fixed in version 23.2.3. BeyondTrust Privileged Remote Access (PRA) y Remote Support (RS) versiones 23.2.1 y 23.2.2 contienen una vulnerabilidad de inyección de comandos que puede explotarse mediante una solicitud HTTP maliciosa. La explotación exitosa de esta vulnerabilidad puede permitir que un atacante remoto no autenticado ejecute comandos del sistema operativo subyacente dentro del contexto del usuario del sitio. • https://beyondtrustcorp.service-now.com/csm?id=kb_article_view&sysparm_article=KB0020207 https://www.beyondtrust.com/blog/entry/security-update-for-remote-support-and-privileged-remote-access • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •