First published: Thu Apr 25 2024(Updated: )
The GLPI Agent is a generic management agent. A vulnerability that only affects GLPI-Agent installed on windows via MSI packaging can allow a local user to cause denial of agent service by replacing GLPI server url with a wrong url or disabling the service. Additionally, in the case the Deploy task is installed, a local malicious user can trigger privilege escalation configuring a malicious server providing its own deploy task payload. GLPI-Agent 1.7.2 contains a patch for this issue. As a workaround, edit GLPI-Agent related key under `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall` and add `SystemComponent` DWORD value setting it to `1` to hide GLPI-Agent from installed applications.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI Agent | <1.7.2 | |
GLPI Agent | <1.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28240 is rated as a medium severity vulnerability.
CVE-2024-28240 allows a local user to disrupt the service by altering the GLPI server URL or disabling the agent service.
CVE-2024-28240 specifically affects GLPI Agent installations on Windows when installed via MSI packaging.
To fix CVE-2024-28240, update to the latest version of GLPI Agent beyond 1.7.2.
No, CVE-2024-28240 requires local access to exploit the vulnerability.