Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-20598

Summary
Assigner-AMD
Assigner Org ID-b58fc414-a1e4-4f92-9d70-1add41838648
Published At-17 Oct, 2023 | 13:26
Updated At-02 Aug, 2024 | 09:05
Rejected At-
Credits

An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:AMD
Assigner Org ID:b58fc414-a1e4-4f92-9d70-1add41838648
Published At:17 Oct, 2023 | 13:26
Updated At:02 Aug, 2024 | 09:05
Rejected At:
▼CVE Numbering Authority (CNA)

An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.

Affected Products
Vendor
Advanced Micro Devices, Inc. AMD
Product
Radeon™ RX 5000 Series Graphics Cards
Platforms
  • Windows
  • x86
Default Status
affected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Radeon™ RX 6000 Series Graphics Cards
Platforms
  • Windows
  • x86
Default Status
affected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Radeon™ RX 7000 Series Graphics Cards
Platforms
  • Windows
  • x86
Default Status
affected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Radeon™ PRO W5000 Series Graphics Cards
Platforms
  • Windows
  • x86
Default Status
affected
Versions
Affected
  • Various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Radeon™ PRO W6000 Series Graphics Cards
Platforms
  • Windows
  • x86
Default Status
affected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Radeon™ PRO W7000 Series Graphics Cards
Platforms
  • Windows
  • x86
Default Status
affected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 7045 Series Processors with Radeon™ Graphics
Platforms
  • Windows
  • x86
Default Status
affected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 7020 Series Processors with Radeon™ Graphics
Platforms
  • Windows
  • x86
Default Status
affected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 7040 Series Processors with Radeon™ Graphics
Platforms
  • Windows
  • x86
Default Status
affected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 7000 Series Processors with Radeon™ Graphics
Platforms
  • Windows
  • x86
Default Status
affected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 6000 Series Processors with Radeon™ Graphics
Platforms
  • Windows
  • x86
Default Status
affected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 7035 Series Processors with Radeon™ Graphics
Platforms
  • Windows
  • x86
Default Status
affected
Versions
Affected
  • various
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009
vendor-advisory
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
Advanced Micro Devices, Inc.amd
Product
radeon_rx_5300_xt
CPEs
  • cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*
  • cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Advanced Micro Devices, Inc.amd
Product
ryzen_5_7645hx
CPEs
  • cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_7545u:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before * (custom)
Vendor
Advanced Micro Devices, Inc.amd
Product
ryzen_9_pro_7945
CPEs
  • cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*
  • cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before * (custom)
Problem Types
TypeCWE IDDescription
CWECWE-269CWE-269 Improper Privilege Management
Type: CWE
CWE ID: CWE-269
Description: CWE-269 Improper Privilege Management
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009
vendor-advisory
x_transferred
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009
Resource:
vendor-advisory
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@amd.com
Published At:17 Oct, 2023 | 14:15
Updated At:03 Jul, 2024 | 01:39

An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Advanced Micro Devices, Inc.
amd
>>radeon_rx_5300>>-
cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_5300_xt>>-
cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_5300m>>-
cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_5500>>-
cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_5500_xt>>-
cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_5500m>>-
cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_5600>>-
cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_5600_xt>>-
cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_5600m>>-
cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_5700>>-
cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_5700_xt>>-
cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_5700m>>-
cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6300m>>-
cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6400>>-
cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6450m>>-
cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6500_xt>>-
cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6500m>>-
cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6550m>>-
cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6550s>>-
cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6600>>-
cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6600_xt>>-
cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6600m>>-
cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6600s>>-
cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6650_xt>>-
cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6650m>>-
cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6650m_xt>>-
cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6700>>-
cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6700_xt>>-
cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6700m>>-
cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6700s>>-
cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6750_gre_10gb>>-
cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6750_gre_12gb>>-
cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6750_xt>>-
cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6800>>-
cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6800_xt>>-
cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6800s>>-
cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6900_xt>>-
cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_6950_xt>>-
cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_7600>>-
cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_7600m>>-
cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_7600m_xt>>-
cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_7600s>>-
cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_7700_xt>>-
cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_7700s>>-
cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_7800_xt>>-
cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_7900_gre>>-
cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_7900_xt>>-
cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_7900_xtx>>-
cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_rx_7900m>>-
cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>radeon_software>>Versions before 23.9.2(exclusive)
cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE-269Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-269
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009psirt@amd.com
Vendor Advisory
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009
Source: psirt@amd.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

748Records found

CVE-2020-12902
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.76%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 15:48
Updated-16 Sep, 2024 | 16:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CVE-2020-12963
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.48%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 15:58
Updated-16 Sep, 2024 | 22:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-763
Release of Invalid Pointer or Reference
CVE-2020-12964
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.76%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 14:51
Updated-16 Sep, 2024 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-radeon_softwareAMD Radeon Software
CVE-2020-12983
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.53%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 21:49
Updated-17 Sep, 2024 | 02:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwareradeon_pro_softwarewindows_10AMD Radeon Software
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-21966
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.3||HIGH
EPSS-0.02% / 6.12%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 19:56
Updated-11 Feb, 2025 | 20:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL hijacking vulnerability in the AMD Ryzen™ Master Utility could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD Ryzen™ Master Utility
CWE ID-CWE-269
Improper Privilege Management
CVE-2022-0556
Matching Score-4
Assigner-Zyxel Corporation
ShareView Details
Matching Score-4
Assigner-Zyxel Corporation
CVSS Score-7.3||HIGH
EPSS-0.04% / 11.14%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 11:50
Updated-02 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A local privilege escalation vulnerability caused by incorrect permission assignment in some directories of the Zyxel AP Configurator (ZAC) version 1.1.4, which could allow an attacker to execute arbitrary code as a local administrator.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-zyxel_ap_configuratorZyxel AP Configurator (ZAC)
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2011-3349
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.59%
||
7 Day CHG~0.00%
Published-19 Nov, 2019 | 21:42
Updated-06 Aug, 2024 | 23:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.

Action-Not Available
Vendor-lightdm_projectlightdm
Product-lightdmlightdm
CWE ID-CWE-269
Improper Privilege Management
CVE-2020-3393
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.10% / 28.73%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 18:02
Updated-19 Dec, 2024 | 13:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software IOx Application Hosting Privilege Escalation Vulnerability

A vulnerability in the application-hosting subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to root on an affected device. The attacker could execute IOS XE commands outside the application-hosting subsystem Docker container as well as on the underlying Linux operating system. These commands could be run as the root user. The vulnerability is due to a combination of two factors: (a) incomplete input validation of the user payload of CLI commands, and (b) improper role-based access control (RBAC) when commands are issued at the command line within the application-hosting subsystem. An attacker could exploit this vulnerability by using a CLI command with crafted user input. A successful exploit could allow the lower-privileged attacker to execute arbitrary CLI commands with root privileges. The attacker would need valid user credentials to exploit this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-catalyst_c9200l-48pxg-4x1100-6g_integrated_services_routercatalyst_c9407rcatalyst_c9300-48pws-c3650-24td4331_integrated_services_routercatalyst_c9500-16x4461_integrated_services_routercatalyst_c9200-24pasr_1000-xws-c3850catalyst_c9200l-48pxg-2ycatalyst_c9200l-48t-4g111x_integrated_services_routercatalyst_9800-lasr_1013catalyst_c9300l-48p-4xcatalyst_c9500-24y4ccatalyst_c9200l-24t-4gws-c3650-24psasr1001-hxcatalyst_9800-clws-c3650-48tqcatalyst_c9200l-48p-4gws-c3650-12x48uzws-c3850-48xs1160_integrated_services_routercatalyst_c9300l-24t-4g1100-lte_integrated_services_routercatalyst_c9200l-24pxg-2yws-c3850-24ucatalyst_9800-801109_integrated_services_routercatalyst_c9200l-24p-4xcatalyst_c9300l-24p-4xcatalyst_c9300l-48p-4gws-c3650-48pd1100-4g_integrated_services_router1111x_integrated_services_routercatalyst_c9300-48uxmcatalyst_9800-401101-4p_integrated_services_router1100-4p_integrated_services_routercatalyst_c9500-40xasr_1006ws-c3850-24xsasr1002-hx-wscatalyst_c9200-24tws-c3650-24pdm1101_integrated_services_router1100-4gltegb_integrated_services_router4451_integrated_services_routerws-c3650-48fqmws-c3850-48tcatalyst_c9200l-48p-4xcatalyst_c9410rcatalyst_c9300-24pasr1001-hx-rfws-c3650-24pdws-c3650-48fsws-c3850-48pws-c3850-24pcatalyst_c9300-48u1100-4gltena_integrated_services_router1100_integrated_services_routerws-c3650-8x24uqcatalyst_9800-l-cws-c3650-48tscatalyst_c9300-48tcatalyst_c9500-12qcatalyst_c9500-24qws-c3650-12x48urcatalyst_c9200-48tcatalyst_c9300-24sasr1002-x-rfws-c3650-12x48uqws-c3650-48tdasr_1001asr1002-hx4221_integrated_services_routercatalyst_c9404rws-c3850-12x48ucatalyst_c9300-24ucatalyst_c9200l-48t-4xws-c3650-48fdasr1002-x-wscatalyst_c9500-32casr_1002-xcatalyst_c9300l-24p-4gws-c3850-12scatalyst_c9500-32qcasr1002-hx-rfws-c3850-48ucatalyst_c9200l-24p-4gcatalyst_c9300-48sws-c3650-48fqws-c3850-48fws-c3850-24xucatalyst_c9300l-48t-4xws-c3650-48ps1109-2p_integrated_services_routerws-c3850-24tasr_1002catalyst_c9300l-24t-4xcatalyst_9800-l-fws-c3650-24tsasr_1004catalyst_c9200-48p1120_integrated_services_routercatalyst_c9300-48uncatalyst_c9200l-24t-4xasr1001-x-rfws-c3650-48pqcatalyst_c9300-24t4431_integrated_services_routercatalyst_c9200l-24pxg-4xasr1001-x-wscsr_1000vios_xecatalyst_c9300l-48t-4g1111x-8p_integrated_services_routercatalyst_c9500-48y4c1100-8p_integrated_services_routerws-c3850-24s1109-4p_integrated_services_routercatalyst_c9300-24uxasr_1001-xws-c3850-12xsCisco IOS XE Software
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-20
Improper Input Validation
CVE-2026-27208
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.2||CRITICAL
EPSS-0.13% / 32.72%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 13:52
Updated-27 Feb, 2026 | 20:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
api-gateway-deploy Affected by Exploitable Command Injection via Unprivileged Root Execution

bleon-ethical/api-gateway-deploy provides API gateway deployment. Version 1.0.0 is vulnerable to an attack chain involving OS Command Injection and Privilege Escalation. This allows an attacker to execute arbitrary commands with root privileges within the container, potentially leading to a container escape and unauthorized infrastructure modifications. This is fixed in version 1.0.1 by implementing strict input sanitization and secure delimiters in entrypoint.sh, enforcing a non-root user (appuser) in the Dockerfile, and establishing mandatory security quality gates.

Action-Not Available
Vendor-bleon-ethicalbleon-ethical
Product-api-gateway-deployapi-gateway-deploy
CWE ID-CWE-250
Execution with Unnecessary Privileges
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2020-3265
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7||HIGH
EPSS-0.15% / 35.02%
||
7 Day CHG~0.00%
Published-19 Mar, 2020 | 15:35
Updated-15 Nov, 2024 | 17:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN Solution Privilege Escalation Vulnerability

A vulnerability in Cisco SD-WAN Solution software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain root-level privileges.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-vedge_cloud_routervedge_20001100-4g_integrated_services_routervedge_100m1100-6g_integrated_services_routervmanage_network_management_systemvedge_5000vsmart_controllersd-wan_firmwarevedge_1001100-4gltegb_integrated_services_routervedge_100wmvedge_10001100-4gltena_integrated_services_routervedge_100bCisco SD-WAN Solution
CWE ID-CWE-264
Not Available
CWE ID-CWE-269
Improper Privilege Management
CVE-2026-2914
Matching Score-4
Assigner-Palo Alto Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Palo Alto Networks, Inc.
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.66%
||
7 Day CHG~0.00%
Published-25 Feb, 2026 | 01:33
Updated-27 Feb, 2026 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CyberArk Endpoint Privilege Manager Agent versions 25.10.0 and lower allow potential unauthorized privilege elevation leveraging CyberArk elevation dialogs

Action-Not Available
Vendor-cyberarkCyberArk Software, a Palo Alto Networks Company
Product-endpoint_privilege_managerEndpoint Privilege Manager Agent
CWE ID-CWE-269
Improper Privilege Management
CVE-2022-1256
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-7.8||HIGH
EPSS-0.11% / 28.82%
||
7 Day CHG~0.00%
Published-14 Apr, 2022 | 13:45
Updated-02 Aug, 2024 | 23:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Privilege Management in McAfee Agent for Windows

A local privilege escalation vulnerability in MA for Windows prior to 5.7.6 allows a local low privileged user to gain system privileges through running the repair functionality. Temporary file actions were performed on the local user's %TEMP% directory with System privileges through manipulation of symbolic links.

Action-Not Available
Vendor-McAfee, LLC
Product-agentMcAfee Agent for Windows
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2012-5617
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 26.52%
||
7 Day CHG~0.00%
Published-25 Nov, 2019 | 13:42
Updated-06 Aug, 2024 | 21:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gksu-polkit: permissive PolicyKit policy configuration file allows privilege escalation

Action-Not Available
Vendor-gksu-polkit_projectgksu-polkitFedora Project
Product-fedoragksu-polkitgksu-polkit
CWE ID-CWE-269
Improper Privilege Management
CVE-2026-23599
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.91%
||
7 Day CHG~0.00%
Published-17 Feb, 2026 | 23:04
Updated-18 Feb, 2026 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege Escalation Vulnerability in HPE Aruba Networking Clear Pass Policy Manager OnGuard for Linux

A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with root privileges.

Action-Not Available
Vendor-Hewlett Packard Enterprise (HPE)
Product-HPE Aruba Networking ClearPass Policy Manager
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-40802
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.86%
||
7 Day CHG~0.00%
Published-29 Jul, 2024 | 22:16
Updated-04 Nov, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A local attacker may be able to elevate their privileges.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOSmacos
CWE ID-CWE-269
Improper Privilege Management
CVE-2012-4480
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.13% / 32.85%
||
7 Day CHG~0.00%
Published-02 Dec, 2019 | 17:44
Updated-06 Aug, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

mom creates world-writable pid files in /var/run

Action-Not Available
Vendor-ovirtmomFedora Project
Product-momfedoramom
CWE ID-CWE-269
Improper Privilege Management
CVE-2012-4760
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.31%
||
7 Day CHG~0.00%
Published-13 Jan, 2020 | 19:12
Updated-06 Aug, 2024 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Privilege Escalation vulnerability exists in the SDBagent service in Safend Data Protector Agent 3.4.5586.9772, which could let a local malicious user obtain privileges.

Action-Not Available
Vendor-safendn/a
Product-data_protector_agentn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-40459
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.02% / 6.08%
||
7 Day CHG~0.00%
Published-22 May, 2025 | 00:00
Updated-30 May, 2025 | 01:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Ocuco Innovation APPMANAGER.EXE v.2.10.24.51 allows a local attacker to escalate privileges via the application manager function

Action-Not Available
Vendor-ocucon/a
Product-innovationn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-40662
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.20%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 00:09
Updated-17 Dec, 2024 | 19:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In scheme of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-38830
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.40%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 11:49
Updated-14 May, 2025 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local privilege escalation vulnerability

VMware Aria Operations contains a local privilege escalation vulnerability. A malicious actor with local administrative privileges may trigger this vulnerability to escalate privileges to root user on the appliance running VMware Aria Operations.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-cloud_foundationaria_operationsVMware Aria Operationsaria_operations
CWE ID-CWE-269
Improper Privilege Management
CVE-2026-21533
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-1.94% / 83.18%
||
7 Day CHG+0.33%
Published-10 Feb, 2026 | 17:51
Updated-27 Feb, 2026 | 20:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2026-03-03||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Windows Remote Desktop Services Elevation of Privilege Vulnerability

Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-Windows Server 2019 (Server Core installation)Windows 11 Version 25H2Windows 10 Version 21H2Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2012Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2Windows Server 2025 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows 11 version 22H3Windows 11 version 26H1Windows Server 2019Windows 10 Version 1607Windows Server 2022Windows 11 Version 26H1Windows Server 2012 (Server Core installation)Windows Server 2025Windows Server 2016 (Server Core installation)Windows 11 Version 24H2Windows Server 2016Windows 10 Version 1809Windows
CWE ID-CWE-269
Improper Privilege Management
CVE-2018-10079
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.95%
||
7 Day CHG~0.00%
Published-20 Apr, 2018 | 21:00
Updated-05 Aug, 2024 | 07:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Geist WatchDog Console 3.2.2 uses a weak ACL for the C:\ProgramData\WatchDog Console directory, which allows local users to modify configuration data by updating (1) config.xml or (2) servers.xml.

Action-Not Available
Vendor-vertivn/a
Product-watchdog_consolen/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2025-9068
Matching Score-4
Assigner-Rockwell Automation
ShareView Details
Matching Score-4
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.00% / 0.16%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 12:23
Updated-24 Oct, 2025 | 17:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FactoryTalk® Linx Privilege Escalation Vulnerabilities

A security issue exists within the Rockwell Automation Driver Package x64 Microsoft Installer File (MSI) repair functionality, installed with FTLinx. Authenticated attackers with valid Windows Users credentials can initiate a repair and hijack the resulting console window for vbpinstall.exe. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-factorytalk_linxFactoryTalk Linx
CWE ID-CWE-269
Improper Privilege Management
CVE-2025-9067
Matching Score-4
Assigner-Rockwell Automation
ShareView Details
Matching Score-4
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.00% / 0.16%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 12:24
Updated-20 Oct, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FactoryTalk® Linx Privilege Escalation Vulnerabilities

A security issue exists within the x86 Microsoft Installer File (MSI), installed with FTLinx. Authenticated attackers with valid Windows user credentials can initiate a repair and hijack the resulting console window. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-factorytalk_linxFactoryTalk Linx
CWE ID-CWE-269
Improper Privilege Management
CVE-2023-32487
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.79%
||
7 Day CHG~0.00%
Published-16 Aug, 2023 | 13:28
Updated-08 Oct, 2024 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS, 8.2.x - 9.5.0.x, contains an elevation of privilege vulnerability. A low privileged local attacker could potentially exploit this vulnerability, leading to denial of service, code execution and information disclosure.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFS
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-45440
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.02%
||
7 Day CHG~0.00%
Published-08 Jan, 2022 | 15:51
Updated-04 Aug, 2024 | 04:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A unnecessary privilege vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security 10.0 SP1 (on-prem versions only) could allow a local attacker to abuse an impersonation privilege and elevate to a higher level of privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsworry-free_business_securityworry-free_business_security_servicesTrend Micro Apex OneTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2020-35593
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.84%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 00:00
Updated-30 Sep, 2024 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BMC PATROL Agent through 20.08.00 allows local privilege escalation via vectors involving pconfig +RESTART -host.

Action-Not Available
Vendor-bmcn/a
Product-patrol_agentn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2025-69875
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.14%
||
7 Day CHG~0.00%
Published-03 Feb, 2026 | 00:00
Updated-11 Feb, 2026 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in Quick Heal Total Security 23.0.0 in the quarantine management component where insufficient validation of restore paths and improper permission handling allow a low-privileged local user to restore quarantined files into protected system directories. This behavior can be abused by a local attacker to place files in high-privilege locations, potentially leading to privilege escalation.

Action-Not Available
Vendor-quickhealn/a
Product-total_securityn/a
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-281
Improper Preservation of Permissions
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2021-44020
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.02%
||
7 Day CHG~0.00%
Published-03 Dec, 2021 | 10:50
Updated-04 Aug, 2024 | 04:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unnecessary privilege vulnerability in Trend Micro Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-44019 and 44021.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-worry-free_business_securityTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-44021
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.02%
||
7 Day CHG~0.00%
Published-03 Dec, 2021 | 10:50
Updated-04 Aug, 2024 | 04:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unnecessary privilege vulnerability in Trend Micro Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-44019 and 44020.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-worry-free_business_securityTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-44019
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.02%
||
7 Day CHG~0.00%
Published-03 Dec, 2021 | 10:50
Updated-04 Aug, 2024 | 04:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unnecessary privilege vulnerability in Trend Micro Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-44020 and 44021.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-worry-free_business_securityTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2023-51386
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.24%
||
7 Day CHG~0.00%
Published-22 Dec, 2023 | 21:58
Updated-02 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sandbox Accounts for Events vulnerable to privilege escalation to read running events data

Sandbox Accounts for Events provides multiple, temporary AWS accounts to a number of authenticated users simultaneously via a browser-based GUI. Authenticated users could potentially read data from the events table by sending request payloads to the events API, collecting information on planned events, timeframes, budgets and owner email addresses. This data access may allow users to get insights into upcoming events and join events which they have not been invited to. This issue has been patched in version 1.10.0.

Action-Not Available
Vendor-amazonawslabs
Product-awslabs_sandbox_accounts_for_eventssandbox-accounts-for-events
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42106
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.57%
||
7 Day CHG~0.00%
Published-21 Oct, 2021 | 07:46
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42107.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsworry-free_business_securityworry-free_business_security_servicesTrend Micro Apex OneTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42322
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.24% / 47.32%
||
7 Day CHG~0.00%
Published-10 Nov, 2021 | 00:47
Updated-04 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Visual Studio Code Elevation of Privilege Vulnerability

Visual Studio Code Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-visual_studio_codeVisual Studio Code
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42277
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.26% / 49.45%
||
7 Day CHG~0.00%
Published-10 Nov, 2021 | 00:47
Updated-04 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability

Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016visual_studiovisual_studio_2019windows_11windows_10windows_server_2022visual_studio_2017windows_server_2019Windows Server 2022Windows 10 Version 1607Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)Windows Server version 2004Windows 10 Version 21H1Windows Server 2019 (Server Core installation)Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server version 20H2Windows 10 Version 1909Microsoft Visual Studio 2015 Update 3Windows 10 Version 20H2Windows Server 2016Windows 10 Version 2004Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)Windows 10 Version 1507Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)Windows Server 2019
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42283
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-0.23% / 45.94%
||
7 Day CHG~0.00%
Published-10 Nov, 2021 | 00:47
Updated-04 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NTFS Elevation of Privilege Vulnerability

NTFS Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_serverwindows_server_2016windows_server_2012windows_rt_8.1windows_7windows_11windows_10windows_server_2022windows_server_2019windows_server_2008Windows Server 2022Windows 10 Version 1607Windows Server version 2004Windows 10 Version 21H1Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows 8.1Windows 7Windows Server version 20H2Windows Server 2012 (Server Core installation)Windows 10 Version 1909Windows 7 Service Pack 1Windows 10 Version 20H2Windows Server 2016Windows 10 Version 2004Windows 10 Version 1507Windows Server 2008 R2 Service Pack 1Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42107
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.57%
||
7 Day CHG~0.00%
Published-21 Oct, 2021 | 07:46
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42106.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsworry-free_business_securityworry-free_business_security_servicesTrend Micro Apex OneTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42104
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.57%
||
7 Day CHG~0.00%
Published-21 Oct, 2021 | 07:46
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42105, 42106 and 42107.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsworry-free_business_securityworry-free_business_security_servicesTrend Micro Apex OneTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42280
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.16% / 36.46%
||
7 Day CHG~0.00%
Published-10 Nov, 2021 | 00:47
Updated-04 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Feedback Hub Elevation of Privilege Vulnerability

Windows Feedback Hub Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_11windows_10windows_server_2022windows_server_2019Windows Server 2022Windows 10 Version 2004Windows 10 Version 1607Windows Server version 2004Windows Server 2019 (Server Core installation)Windows 10 Version 21H1Windows Server 2016Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2019Windows Server version 20H2Windows 10 Version 1909Windows 10 Version 20H2
CWE ID-CWE-269
Improper Privilege Management
CVE-2025-6759
Matching Score-4
Assigner-Citrix Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Citrix Systems, Inc.
CVSS Score-7.3||HIGH
EPSS-0.02% / 3.87%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 21:41
Updated-26 Feb, 2026 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges

Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Windows Virtual Delivery Agent for CVAD and Citrix DaaS

Action-Not Available
Vendor-Citrix (Cloud Software Group, Inc.)
Product-virtual_apps_and_desktopsWindows Virtual Delivery Agent for CVAD and Citrix DaaS
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42108
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.57%
||
7 Day CHG~0.00%
Published-21 Oct, 2021 | 07:46
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unnecessary privilege vulnerabilities in the Web Console of Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsworry-free_business_securityworry-free_business_security_servicesTrend Micro Apex OneTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2023-50700
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.51%
||
7 Day CHG~0.00%
Published-26 Jul, 2024 | 00:00
Updated-02 Aug, 2024 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure Permissions vulnerability in Deepin dde-file-manager 6.0.54 and earlier allows privileged operations to be called by unprivileged users via the D-Bus method.

Action-Not Available
Vendor-n/adeepin
Product-n/adde_file_manager
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42285
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.26% / 48.66%
||
7 Day CHG~0.00%
Published-10 Nov, 2021 | 00:47
Updated-04 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Kernel Elevation of Privilege Vulnerability

Windows Kernel Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_serverwindows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_11windows_10windows_server_2022windows_server_2019windows_server_2008Windows Server 2022Windows 10 Version 1607Windows Server version 2004Windows 10 Version 21H1Windows Server 2019 (Server Core installation)Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows 8.1Windows 7Windows Server version 20H2Windows Server 2012 (Server Core installation)Windows 10 Version 1909Windows 7 Service Pack 1Windows 10 Version 20H2Windows Server 2016Windows 10 Version 2004Windows 10 Version 1507Windows Server 2008 R2 Service Pack 1Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2012Windows Server 2019Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42105
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.57%
||
7 Day CHG~0.00%
Published-21 Oct, 2021 | 07:46
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42106 and 42107.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsworry-free_business_securityworry-free_business_security_servicesTrend Micro Apex OneTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42286
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.25% / 47.86%
||
7 Day CHG~0.00%
Published-10 Nov, 2021 | 00:47
Updated-18 Nov, 2024 | 20:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability

Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_serverwindows_10windows_server_2016Windows 10 Version 2004Windows Server version 2004Windows 10 Version 21H1Windows Server version 20H2Windows 10 Version 20H2
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42956
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.16% / 36.54%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 11:51
Updated-04 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zoho Remote Access Plus Server Windows Desktop Binary fixed in 10.1.2132.6 is affected by a sensitive information disclosure vulnerability. Due to improper privilege management, the process launches as the logged in user, so memory dump can be done by non-admin also. Remotely, an attacker can dump all sensitive information including DB Connection string, entire IT infrastructure details, commands executed by IT admin including credentials, secrets, private keys and more.

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.Microsoft Corporation
Product-windowsmanageengine_remote_access_plus_servern/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-40443
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.31% / 54.00%
||
7 Day CHG~0.00%
Published-13 Oct, 2021 | 00:26
Updated-04 Aug, 2024 | 02:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Common Log File System Driver Elevation of Privilege Vulnerability

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_serverwindows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_11windows_10windows_server_2019windows_server_2008Windows Server 2022Windows 10 Version 1607Windows Server version 2004Windows 10 Version 21H1Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows 8.1Windows 7Windows Server version 20H2Windows Server 2012 (Server Core installation)Windows 10 Version 1909Windows 7 Service Pack 1Windows 10 Version 20H2Windows Server 2016Windows 10 Version 2004Windows 10 Version 1507Windows Server 2008 R2 Service Pack 1Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-41347
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.20% / 42.27%
||
7 Day CHG~0.00%
Published-13 Oct, 2021 | 00:28
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows AppX Deployment Service Elevation of Privilege Vulnerability

Windows AppX Deployment Service Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_11windows_10windows_server_2022windows_server_2019Windows Server 2022Windows 10 Version 2004Windows 10 Version 1507Windows 10 Version 1607Windows Server version 2004Windows Server 2019 (Server Core installation)Windows 10 Version 21H1Windows Server 2016Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2019Windows Server version 20H2Windows 10 Version 1909Windows 10 Version 20H2
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-41377
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.32% / 54.43%
||
7 Day CHG~0.00%
Published-10 Nov, 2021 | 00:46
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Fast FAT File System Driver Elevation of Privilege Vulnerability

Windows Fast FAT File System Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_11windows_10windows_server_2022windows_server_2019windows_server_2008Windows Server 2022Windows 10 Version 1607Windows Server version 2004Windows 10 Version 21H1Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows 8.1Windows 7Windows Server version 20H2Windows Server 2012 (Server Core installation)Windows 10 Version 1909Windows 7 Service Pack 1Windows 10 Version 20H2Windows Server 2016Windows 10 Version 2004Windows 10 Version 1507Windows Server 2008 R2 Service Pack 1Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-41366
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.17% / 38.30%
||
7 Day CHG~0.00%
Published-10 Nov, 2021 | 00:46
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability

Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_11windows_10windows_server_2022windows_server_2019Windows Server 2022Windows 10 Version 1607Windows Server version 2004Windows 10 Version 21H1Windows Server 2019 (Server Core installation)Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows 8.1Windows Server 2012 (Server Core installation)Windows Server version 20H2Windows 10 Version 1909Windows 10 Version 20H2Windows Server 2016Windows 10 Version 2004Windows 10 Version 1507Windows Server 2012 R2Windows Server 2012Windows Server 2019Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-269
Improper Privilege Management
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 14
  • 15
  • Next
Details not found