Impact
The vulnerability in OpenText Operations Agent allows an attacker to execute arbitrary programs from writable locations on a Windows system. By doing so, the attacker can gain elevated privileges, effectively bypassing security controls and accessing system resources that should be protected. This flaw is classified as a user-controlled write weakness (CWE‑280) and can result in arbitrary code execution with higher privileges.
Affected Systems
OpenText Operations Agent versions 12.24 through 12.29 running on Windows are affected. Impacted binaries include HFWIN_1224028.tar through HFWIN_1229007.tar, each corresponding to a specific OA release within the 12.24 to 12.29 range.
Risk and Exploitability
With a CVSS score of 8.6, this issue is considered high risk. Exploitation requires the attacker to write files to specific directories that the agent processes, which may be achievable through local, compromised, or shared user accounts. The vulnerability is not yet listed in the CISA KEV catalog, and EPSS data is not available, but the high severity indicates a significant risk if the conditions are met.
OpenCVE Enrichment