CVE-2024-40872 Vulnerability Details

  /     /     /  

CVE-2024-40872 Metadata Quick Info

CVE Published: 25/07/2024 | CVE Updated: 02/08/2024 | CVE Year: 2024
Source: Absolute | Vendor: Absolute Security | Product: Secure Access
Status : PUBLISHED

CVE-2024-40872 Description

There is an elevation of privilege vulnerability in server and client components of Absolute Secure Access prior to version 13.07. Attackers with local access and valid desktop user credentials can elevate their privilege to system level by passing invalid address data to the vulnerable component. This could be used to manipulate process tokens to elevate the privilege of a normal process to System. The scope is changed, the impact to system confidentiality and integrity is high, the impact to the availability of the effected component is none.

Metrics

CVSS Version: 3.1 | Base Score: 8.4 HIGH
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* LOCAL
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* LOW
    User Interaction (UI)* NONE
    Scope (S)* CHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* HIGH
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-822
CWE Name: CWE-822 Untrusted Pointer Dereference
Source: Absolute Security

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-69
CAPEC Description: CAPEC-69 Target Programs with Elevated Privileges


Source: NVD (National Vulnerability Database).