CVE-2021-28249
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicious library in the writable RPATH, to be dynamically linked when the FtpCollector executable is run. The code in the library will be executed as the root user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CA eHealth Performance Manager versiones hasta 6.3.2.12, está afectado por una Escalada de Privilegios por medio de una Dynamically Linked Shared Object Library. Para explotar la vulnerabilidad, el usuario de ehealth debe crear una biblioteca maliciosa en el RPATH escribible, que se vinculará dinámicamente cuando se ejecuta el ejecutable FtpCollector. El código de la biblioteca se ejecutará como usuario root. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no son compatibles por el mantenedor.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-03-12 CVE Reserved
- 2021-03-26 CVE Published
- 2024-07-29 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-426: Untrusted Search Path
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://n4nj0.github.io/advisories/ca-ehealth-performance-manager | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ca Search vendor "Ca" | Ehealth Performance Manager Search vendor "Ca" for product "Ehealth Performance Manager" | <= 6.3.2.12 Search vendor "Ca" for product "Ehealth Performance Manager" and version " <= 6.3.2.12" | - |
Affected
|