9.3
CVSSv2

CVE-2018-5406

Published: 03/06/2019 Updated: 18/09/2020
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Quest Kace K1000 Appliance, versions before 9.0.270, allows a remote malicious user to exploit the misconfigured Cross-Origin Resource Sharing (CORS) mechanism. An unauthenticated, remote attacker could exploit this vulnerability to perform sensitive actions such as adding a new administrator account or changing the appliance’s settings. A malicious internal user could also gain administrator privileges of this appliance and use it to visit a malicious link that exploits this vulnerability. This could cause the application to perform sensitive actions such as adding a new administrator account or changing the appliance’s settings. An unauthenticated, remote attacker could add an administrator-level account or change the appliance's settings.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

quest kace_systems_management_appliance_firmware

Exploits

# Exploit Title: [Dell Kace Appliance Multiple Vulnerabilities] # Date: [12/04/2018] # Exploit Author: [SlidingWindow], Twitter: @kapil_khot # Vendor Homepage: [wwwquestcom/products/kace-systems-management-appliance/] # Affected Versions: [KACE SMA versions prior to 90270 PATCH SEC2018_20180410] # Tested on: [Quest Kace K1000 Appliance ...
Dell KACE System Management Appliance (SMA) versions prior to 90270 patch SEC2018_20180410 suffers from cross site scripting and remote SQL injection vulnerabilities ...