First published: Mon Mar 07 2022(Updated: )
otris Update Manager 1.2.1.0 allows local users to achieve SYSTEM access via unauthenticated calls to exposed interfaces over a .NET named pipe. A remote attack may be possible as well, by leveraging WsHTTPBinding for HTTP traffic on TCP port 9000.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
otris Update Manager | =1.2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40376 is classified as a high severity vulnerability due to potential local privilege escalation to SYSTEM access.
To fix CVE-2021-40376, you should update the otris Update Manager to version 1.2.1.1 or later.
CVE-2021-40376 can be exploited through local access or potentially via remote attacks leveraging WsHTTPBinding over HTTP traffic on TCP port 9000.
Any users operating otris Update Manager version 1.2.1.0 are affected by CVE-2021-40376.
CVE-2021-40376 exploits unauthenticated calls to exposed interfaces over a .NET named pipe.