First published: Wed Dec 08 2021(Updated: )
An issue was discovered in Plex Media Server through 1.24.4.5081-e362dc1ee. An attacker (with a foothold in a endpoint via a low-privileged user account) can access the exposed RPC service of the update service component. This RPC functionality allows the attacker to interact with the RPC functionality and execute code from a path of his choice (local, or remote via SMB) because of a TOCTOU race condition. This code execution is in the context of the Plex update service (which runs as SYSTEM).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plex Media Server | <1.25.0.5282 | |
Microsoft Windows | ||
All of | ||
Plex Media Server | <1.25.0.5282 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42835 is a vulnerability discovered in Plex Media Server through version 1.24.4.5081-e362dc1ee.
CVE-2021-42835 allows an attacker with a low-privileged user account to access the exposed RPC service of the Plex Media Server update service component.
With CVE-2021-42835, an attacker can interact with the RPC functionality of the Plex Media Server update service component.
CVE-2021-42835 is classified as a high-severity vulnerability with a severity value of 7.
To fix CVE-2021-42835, you should update Plex Media Server to version 1.25.0.5282 or newer.