CVE-2024-1470
Elevation of Privilege attack on NetIQ Client login extension
Severity Score
7.1
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
Authorization Bypass Through User-Controlled Key vulnerability in NetIQ (OpenText) Client Login Extension on Windows allows Privilege Escalation, Code Injection.This issue
only
affects NetIQ Client Login Extension: 4.6.
La vulnerabilidad de omisión de autorización a través de clave controlada por el usuario en la extensión de inicio de sesión del cliente NetIQ (OpenText) en Windows permite la escalada de privilegios y la inyección de código. Este problema solo afecta a la extensión de inicio de sesión del cliente NetIQ: 4.6.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-02-13 CVE Reserved
- 2024-02-20 CVE Published
- 2024-02-21 EPSS Updated
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-639: Authorization Bypass Through User-Controlled Key
CAPEC
- CAPEC-233: Privilege Escalation
- CAPEC-242: Code Injection
References (1)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
OpenText Search vendor "OpenText" | NetIQ Client Login Extension Search vendor "OpenText" for product "NetIQ Client Login Extension" | 4.6 Search vendor "OpenText" for product "NetIQ Client Login Extension" and version "4.6" | en |
Affected
|