A privilege escalation vulnerability exists in the node update functionality of Veertu Anka Build 1.42.0. A specially crafted PKG file can lead to execute priviledged operation. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-38229 A privilege escalation vulnerability exists in the node update functionality of Veertu Anka Build 1.42.0. A specially crafted PKG file can lead to execute priviledged operation. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 04 Sep 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Veertu anka Build Cloud
CPEs cpe:2.3:a:veertu:anka_build_cloud:1.42.0:*:*:*:*:*:*:*
Vendors & Products Veertu anka Build Cloud

Wed, 18 Dec 2024 14:45:00 +0000

Type Values Removed Values Added
Description A privilege escalation vulnerability exists in the Veertu Anka Build 1.42.0. The vulnerability occurs during Anka node agent update. A low privilege user can trigger the update action which can result in unexpected elevation of privilege. A privilege escalation vulnerability exists in the node update functionality of Veertu Anka Build 1.42.0. A specially crafted PKG file can lead to execute priviledged operation. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.

Fri, 22 Nov 2024 12:00:00 +0000


Thu, 03 Oct 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Veertu
Veertu anka Build
CPEs cpe:2.3:a:veertu:anka_build:1.42.0:*:*:*:*:*:*:*
Vendors & Products Veertu
Veertu anka Build
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 03 Oct 2024 15:30:00 +0000

Type Values Removed Values Added
Description A privilege escalation vulnerability exists in the Veertu Anka Build 1.42.0. The vulnerability occurs during Anka node agent update. A low privilege user can trigger the update action which can result in unexpected elevation of privilege.
Weaknesses CWE-282
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-12-18T14:31:20.169Z

Reserved: 2024-08-02T16:15:01.522Z

Link: CVE-2024-39755

cve-icon Vulnrichment

Updated: 2024-10-03T17:02:47.885Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-03T16:15:05.230

Modified: 2025-09-04T18:55:43.367

Link: CVE-2024-39755

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.