CVE-2024-36458
Symantec Privileged Access Manager Privilege Escalation vulnerability
Severity Score
5.1
*CVSS v4
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
The vulnerability allows a malicious low-privileged PAM user to perform server upgrade related actions.
La vulnerabilidad permite a un usuario malicioso de PAM con pocos privilegios realizar acciones relacionadas con la actualizaciĆ³n del servidor.
*Credits:
Abdel Adim `smaury` Oisfi of Shielder (https://www.shielder.com) - research@shielder.com, Paolo CavagliĆ of Shielder (https://www.shielder.com) - research@shielder.com
CVSS Scores
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-05-28 CVE Reserved
- 2024-07-15 CVE Published
- 2024-07-16 EPSS Updated
- 2024-11-21 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
- CAPEC-233: Privilege Escalation
References (1)
URL | Tag | Source |
---|---|---|
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24678 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Broadcom Search vendor "Broadcom" | Symantec Privileged Access Management Search vendor "Broadcom" for product "Symantec Privileged Access Management" | 3.4.6 Search vendor "Broadcom" for product "Symantec Privileged Access Management" and version "3.4.6" | en |
Affected
|