Impact
The vulnerability stems from a .NET misconfiguration that permits the use of impersonation in upKeeper Instant Privilege Access. This flaw enables an attacker to hijack a privileged thread of execution, effectively taking control of the thread’s security context. As a result, the attacker can perform higher‑privilege actions, such as accessing sensitive data or executing privileged code, without the need for direct credential compromise. The weakness aligns with CWE‑520, which denotes improper configuration of security features.
Affected Systems
The issue affects upKeeper Solutions’ upKeeper Instant Privilege Access application. Versions up to and including 1.5.0 are vulnerable. No other product or vendor information is specified.
Risk and Exploitability
The CVSS score of 7.4 indicates a high severity level, while no EPSS value is provided and the vulnerability is not listed in the CISA KEV catalog, suggesting limited documented exploitation. The attack appears to rely on the ability to influence the application’s impersonation mechanism, implying an internal or compromised environment as the primary vector. Nonetheless, the impact on confidentiality, integrity, and availability could be substantial if an attacker succeeds in hijacking the thread, making this a significant risk for affected deployments.
OpenCVE Enrichment