// For flags

CVE-2024-36458

Symantec Privileged Access Manager Privilege Escalation vulnerability

Severity Score

5.1
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

The vulnerability allows a malicious low-privileged PAM user to perform server upgrade related actions.

La vulnerabilidad permite a un usuario malicioso de PAM con pocos privilegios realizar acciones relacionadas con la actualizaciĆ³n del servidor.

*Credits: Abdel Adim `smaury` Oisfi of Shielder (https://www.shielder.com) - research@shielder.com, Paolo CavagliĆ  of Shielder (https://www.shielder.com) - research@shielder.com
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Attack Requirements
None
Privileges Required
Low
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
Low
None
Availability
None
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-05-28 CVE Reserved
  • 2024-07-15 CVE Published
  • 2024-07-16 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
  • CAPEC-233: Privilege Escalation
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Broadcom
Search vendor "Broadcom"
Symantec Privileged Access Management
Search vendor "Broadcom" for product "Symantec Privileged Access Management"
3.4.6
Search vendor "Broadcom" for product "Symantec Privileged Access Management" and version "3.4.6"
en
Affected