CVE-2018-11134
31.05.2018, 18:29
In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A low-privilege user could abuse this feature by changing the password of the 'kace_support' account, which comes disabled by default but has full sudo privileges.Enginsight
Vendor | Product | Version |
---|---|---|
quest | kace_system_management_appliance | 8.0.318 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration