7.8
CVSSv3

CVE-2016-9795

Published: 27/01/2017 Updated: 09/11/2021
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The casrvc program in CA Common Services, as used in CA Client Automation 12.8, 12.9, and 14.0; CA SystemEDGE 5.8.2 and 5.9; CA Systems Performance for Infrastructure Managers 12.8 and 12.9; CA Universal Job Management Agent 11.2; CA Virtual Assurance for Infrastructure Managers 12.8 and 12.9; CA Workload Automation AE 11, 11.3, 11.3.5, and 11.3.6 on AIX, HP-UX, Linux, and Solaris allows local users to modify arbitrary files and consequently gain root privileges via vectors related to insufficient validation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

broadcom ca workload automation ae 11.0

broadcom ca workload automation ae 11.3

broadcom ca workload automation ae 11.3.5

broadcom ca workload automation ae 11.3.6

broadcom client automation 12.8

broadcom client automation 12.9

broadcom client automation 14.0

broadcom systemedge 5.8.2

broadcom systemedge 5.9

broadcom systems performance for infrastructure managers 12.8

broadcom systems performance for infrastructure managers 12.9

ca universal job management agent 11.2

ca virtual assurance for infrastructure managers 12.8

ca virtual assurance for infrastructure managers 12.9

Github Repositories

Revisited CVE-2016-9795 privilege escalation (casrvc binary from CA Common Services suite)

CA Common Services privilege escalation (CVE-2016-9795) revisited Description In one of my pentests, I stumbled across the casrvc SUID binary (which is part of CA Common Services suite) As I found out, the binary is vulnerable to local privilege escalation As a matter of fact, a public CVE (CVE-2016-9795) was already attributed to this vulnerability by NCC group The vulnerab