2025-02-18 21:04:14 +00:00

29 lines
2.1 KiB
JSON

{
"id": "CVE-2024-55968",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-28T22:15:15.860",
"lastModified": "2025-02-18T19:15:19.413",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in DTEX DEC-M (DTEX Forwarder) 6.1.1. The com.dtexsystems.helper service, responsible for handling privileged operations within the macOS DTEX Event Forwarder agent, fails to implement critical client validation during XPC interprocess communication (IPC). Specifically, the service does not verify the code requirements, entitlements, security flags, or version of any client attempting to establish a connection. This lack of proper logic validation allows malicious actors to exploit the service's methods via unauthorized client connections, and escalate privileges to root by abusing the DTConnectionHelperProtocol protocol's submitQuery method over an unauthorized XPC connection."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en DTEX DEC-M (DTEX Forwarder) 6.1.1. El servicio com.dtexsystems.helper, responsable de gestionar operaciones privilegiadas dentro del agente DTEX Event Forwarder de macOS, no implementa la validaci\u00f3n cr\u00edtica del cliente durante la comunicaci\u00f3n entre procesos (IPC) de XPC. Espec\u00edficamente, el servicio no verifica los requisitos del c\u00f3digo, los derechos, los indicadores de seguridad o la versi\u00f3n de ning\u00fan cliente que intente establecer una conexi\u00f3n. Esta falta de validaci\u00f3n l\u00f3gica adecuada permite que los actores maliciosos exploten los m\u00e9todos del servicio a trav\u00e9s de conexiones de cliente no autorizadas y escalen privilegios a la ra\u00edz al abusar del m\u00e9todo submissionQuery del protocolo DTConnectionHelperProtocol a trav\u00e9s de una conexi\u00f3n XPC no autorizada."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Wi1DN00B/CVE-2024-55968",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/null-event/CVE-2024-55968",
"source": "cve@mitre.org"
}
]
}