First published: Thu May 31 2018(Updated: )
In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A low-privilege user could abuse this feature by changing the password of the 'kace_support' account, which comes disabled by default but has full sudo privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quest KACE Systems Management Appliance | =8.0.318 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11134 is considered a high severity vulnerability due to its potential to allow unauthorized users to change any user's password.
To fix CVE-2018-11134, update the Quest KACE System Management Appliance to a version later than 8.0.318 that addresses this vulnerability.
The implications of CVE-2018-11134 include the risk of unauthorized access and privilege escalation to sensitive accounts, including the root account.
CVE-2018-11134 specifically affects Quest KACE System Management Appliance version 8.0.318.
Yes, CVE-2018-11134 can potentially be exploited remotely if the attacker has access to the message queue system that manages privileged commands.