2024-10-31 15:03:34 +00:00

64 lines
2.3 KiB
JSON

{
"id": "CVE-2024-39708",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-28T01:15:08.793",
"lastModified": "2024-10-31T14:35:16.610",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the Agent in Delinea Privilege Manager (formerly Thycotic Privilege Manager) before 12.0.1096 on Windows. Sometimes, a non-administrator user can copy a crafted DLL file to a temporary directory (used by .NET Shadow Copies) such that privilege escalation can occur if the core agent service loads that file."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en el Agente en Delinea Privilege Manager (anteriormente Thycotic Privilege Manager) antes de la versi\u00f3n 12.0.1096 en Windows. A veces, un usuario que no es administrador puede copiar un archivo DLL manipulado en un directorio temporal (utilizado por las instant\u00e1neas de .NET), de modo que se puede producir una escalada de privilegios si el servicio del agente principal carga ese archivo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://docs.delinea.com/online-help/privilege-manager/release-notes/12.0.1-combined.htm",
"source": "cve@mitre.org"
},
{
"url": "https://www.cyberark.com/resources/threat-research-blog/identity-crisis-the-curious-case-of-a-delinea-local-privilege-escalation-vulnerability",
"source": "cve@mitre.org"
}
]
}