First published: Mon Jun 18 2018(Updated: )
An input validation vulnerability in CA Privileged Access Manager 2.x allows unprivileged users to execute arbitrary commands by passing specially crafted arguments to the update_crld script.
Credit: vuln@ca.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Privileged Access Manager | >=2.0.0<3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9023 is considered a high severity vulnerability due to the risk of arbitrary command execution.
To fix CVE-2018-9023, ensure to upgrade CA Privileged Access Manager to version 3.0.0 or later.
CVE-2018-9023 affects unprivileged users of CA Privileged Access Manager versions 2.0.0 to 2.x.
An attacker exploiting CVE-2018-9023 can execute arbitrary commands on the system via specially crafted arguments.
There are no known workarounds for CVE-2018-9023; updating to a patched version is the recommended solution.