8.8
CVSSv3

CVE-2018-11134

Published: 31/05/2018 Updated: 29/06/2018
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A low-privilege user could abuse this feature by changing the password of the 'kace_support' account, which comes disabled by default but has full sudo privileges.

Vulnerable Product Search on Vulmon Subscribe to Product

quest kace system management appliance 8.0.318

Exploits

Quest KACE System Management Appliance version 80 (Build 80318) suffers from code execution, cross site scripting, path traversal, remote SQL injection, and various other vulnerabilities ...