2024-07-14 02:06:08 +00:00

90 lines
2.5 KiB
JSON

{
"id": "CVE-2022-43997",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-26T21:17:50.333",
"lastModified": "2023-02-06T16:24:17.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in Aternity agent in Riverbed Aternity before 12.1.4.27 allows for local privilege escalation. There is an insufficiently protected handle to the A180AG.exe SYSTEM process with PROCESS_ALL_ACCESS rights."
},
{
"lang": "es",
"value": "El control de acceso incorrecto en el agente de Aternity en Riverbed Aternity antes de 12.1.4.27 permite la escalada de privilegios locales. Hay un identificador insuficientemente protegido para el proceso del SYSTEM A180AG.exe con derechos PROCESS_ALL_ACCESS."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:aternity:aternity:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.1.4.27",
"matchCriteriaId": "839660B2-3A79-49D7-9D25-99CD7219B76F"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/jackullrich/21fcfe75aeb5e18c60b80e684b83d741",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://winternl.com/cve-2022-43997/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}