First published: Wed Feb 19 2025(Updated: )
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets. (CWE-1220) Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not correctly perform an authorization check in the user console trash content An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network.
Credit: security.vulnerabilities@hitachivantara.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Vantara Pentaho Business Intelligence Server | <10.2.0.0<9.3.0.9>=8.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6696 has been classified with a significant severity due to its potential impact on data protection and system integrity.
To remediate CVE-2024-6696, ensure you upgrade the Hitachi Vantara Pentaho Business Analytics Server to version 10.2.0.0 or 9.3.0.9, or apply the latest patches.
CVE-2024-6696 affects specific versions of the Hitachi Vantara Pentaho Business Analytics Server, particularly versions earlier than 10.2.0.0, 9.3.0.9, and 8.3.x.
CVE-2024-6696 poses a risk by allowing untrusted agents to exploit insufficient access controls, potentially leading to unauthorized reads and writes.
While CVE-2024-6696 is specific to certain versions of Hitachi Vantara Pentaho, it reflects a common issue found in many software systems regarding access control granularity.