First published: Mon Jun 03 2019(Updated: )
The Quest Kace K1000 Appliance, versions prior to 9.0.270, allows a remote attacker to exploit the misconfigured Cross-Origin Resource Sharing (CORS) mechanism. An unauthenticated, remote attacker could exploit this vulnerability to perform sensitive actions such as adding a new administrator account or changing the appliance’s settings. A malicious internal user could also gain administrator privileges of this appliance and use it to visit a malicious link that exploits this vulnerability. This could cause the application to perform sensitive actions such as adding a new administrator account or changing the appliance’s settings. An unauthenticated, remote attacker could add an administrator-level account or change the appliance's settings.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quest Kace Systems Management Appliance Firmware | <9.0.270 | |
Quest KACE Systems Management Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Quest Kace K1000 Appliance is CVE-2018-5406.
The severity level of CVE-2018-5406 is critical with a severity value of 8.8.
An attacker can exploit CVE-2018-5406 by exploiting the misconfigured Cross-Origin Resource Sharing (CORS) mechanism.
Versions prior to 9.0.270 of the Quest Kace K1000 Appliance are affected.
Yes, the fix for CVE-2018-5406 is to update to version 9.0.270 or later of the Quest Kace K1000 Appliance.