CVE-2022-43997

Incorrect access control in Aternity agent in Riverbed Aternity before 12.1.4.27 allows for local privilege escalation. There is an insufficiently protected handle to the A180AG.exe SYSTEM process with PROCESS_ALL_ACCESS rights.
References
Link Resource
https://gist.github.com/jackullrich/21fcfe75aeb5e18c60b80e684b83d741 Exploit Third Party Advisory
https://winternl.com/cve-2022-43997/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:aternity:aternity:*:*:*:*:*:*:*:*

History

06 Feb 2023, 16:24

Type Values Removed Values Added
CPE cpe:2.3:a:aternity:aternity:*:*:*:*:*:*:*:*
First Time Aternity
Aternity aternity
References (MISC) https://winternl.com/cve-2022-43997/ - (MISC) https://winternl.com/cve-2022-43997/ - Exploit, Third Party Advisory
References (MISC) https://gist.github.com/jackullrich/21fcfe75aeb5e18c60b80e684b83d741 - (MISC) https://gist.github.com/jackullrich/21fcfe75aeb5e18c60b80e684b83d741 - Exploit, Third Party Advisory
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

26 Jan 2023, 21:17

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-26 21:17

Updated : 2023-12-10 14:48


NVD link : CVE-2022-43997

Mitre link : CVE-2022-43997

CVE.ORG link : CVE-2022-43997


JSON object : View

Products Affected

aternity

  • aternity