First published: Fri Mar 26 2021(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. A regular user must create a malicious library in the writable RPATH, to be dynamically linked when the emtgtctl2 executable is run. The code in the library will be executed as the ehealth user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Ehealth | <=6.3.2.12 | |
<=6.3.2.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28246 is classified as a privilege escalation vulnerability.
To remediate CVE-2021-28246, restrict write access to the RPATH or upgrade to a patched version of CA eHealth Performance Manager.
CVE-2021-28246 affects users of CA eHealth Performance Manager version 6.3.2.12 and earlier.
An attacker can exploit CVE-2021-28246 by creating a malicious dynamically linked shared object library.
If patching is not an option, consider implementing strict access controls to mitigate the risk associated with CVE-2021-28246.