First published: Thu May 31 2018(Updated: )
In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A low-privilege user could abuse this feature by changing the password of the 'kace_support' account, which comes disabled by default but has full sudo privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quest KACE System Management Appliance | =8.0.318 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.