A privilege escalation vulnerability may enable a service account to elevate its privileges.



The sudo rules configured for a local service account were excessively permissive, potentially allowing administrative access if a malicious actor could execute arbitrary commands as that account.

It is important to note that no such vector has been identified in this instance.
Fixes

Solution

Upgrade to v24.6.0 or later.


Workaround

No workaround given by the vendor.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00013}

epss

{'score': 0.00014}


Tue, 10 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Jun 2025 10:45:00 +0000

Type Values Removed Values Added
Description A privilege escalation vulnerability may enable a service account to elevate its privileges. The sudo rules configured for a local service account were excessively permissive, potentially allowing administrative access if a malicious actor could execute arbitrary commands as that account. It is important to note that no such vector has been identified in this instance.
Title Privilege escalation in Guardian/CMC before 24.6.0
Weaknesses CWE-250
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2025-06-10T14:28:19.863Z

Reserved: 2024-12-31T11:12:59.363Z

Link: CVE-2024-13090

cve-icon Vulnrichment

Updated: 2025-06-10T14:28:09.811Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-10T11:15:52.477

Modified: 2025-06-12T16:06:39.330

Link: CVE-2024-13090

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.