CVE-2018-11134

In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A low-privilege user could abuse this feature by changing the password of the 'kace_support' account, which comes disabled by default but has full sudo privileges.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:quest:kace_system_management_appliance:8.0.318:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-05-31 18:29

Updated : 2023-12-10 12:30


NVD link : CVE-2018-11134

Mitre link : CVE-2018-11134

CVE.ORG link : CVE-2018-11134


JSON object : View

Products Affected

quest

  • kace_system_management_appliance
CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password