First published: Fri Dec 12 2014(Updated: )
BMC Track-It! 11.3 allows remote attackers to gain privileges and execute arbitrary code by creating an account whose name matches that of a local system account, then performing a password reset.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bmc Track-it\! | =11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8270 is considered a high severity vulnerability due to its potential for privilege escalation and arbitrary code execution.
To fix CVE-2014-8270, ensure that account names do not match local system account names and apply any available patches for BMC Track-It! 11.3.
CVE-2014-8270 affects users of BMC Track-It! version 11.3.
CVE-2014-8270 is classified as a privilege escalation vulnerability.
Yes, CVE-2014-8270 can be exploited remotely by attackers who create accounts that match local system account names.