Description
Due to excessive privileges granted to the web user running the airpointer web platform, a malicious actor that gains control of the this user would be able to privilege escalate to the root user
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16469 | Due to excessive privileges granted to the web user running the airpointer web platform, a malicious actor that gains control of the this user would be able to privilege escalate to the root user |
References
| Link | Providers |
|---|---|
| https://jct-aq.com/products/airpointer2d/ |
|
History
Fri, 30 May 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 May 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to excessive privileges granted to the web user running the airpointer web platform, a malicious actor that gains control of the this user would be able to privilege escalate to the root user | |
| Title | Local Privilege Escalation | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GovTech CSG
Published:
Updated: 2025-05-30T12:58:45.485Z
Reserved: 2025-05-13T01:42:19.510Z
Link: CVE-2025-4636
Updated: 2025-05-30T12:58:04.887Z
Status : Deferred
Published: 2025-05-30T09:15:25.813
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-4636
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD