Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-45328

Summary
Assigner-fortinet
Assigner Org ID-6abe59d8-c742-4dff-8ce8-9b0ca1073da8
Published At-11 Mar, 2025 | 14:54
Updated At-12 Mar, 2025 | 04:00
Rejected At-
Credits

An incorrect authorization vulnerability [CWE-863] in FortiSandbox 4.4.0 through 4.4.6 may allow a low priviledged administrator to execute elevated CLI commands via the GUI console menu.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:fortinet
Assigner Org ID:6abe59d8-c742-4dff-8ce8-9b0ca1073da8
Published At:11 Mar, 2025 | 14:54
Updated At:12 Mar, 2025 | 04:00
Rejected At:
▼CVE Numbering Authority (CNA)

An incorrect authorization vulnerability [CWE-863] in FortiSandbox 4.4.0 through 4.4.6 may allow a low priviledged administrator to execute elevated CLI commands via the GUI console menu.

Affected Products
Vendor
Fortinet, Inc.Fortinet
Product
FortiSandbox
Default Status
unaffected
Versions
Affected
  • From 4.4.0 through 4.4.6 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-863Escalation of privilege
Type: CWE
CWE ID: CWE-863
Description: Escalation of privilege
Metrics
VersionBase scoreBase severityVector
3.17.1HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Version: 3.1
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Please upgrade to FortiSandbox version 5.0.0 or above Please upgrade to FortiSandbox version 4.4.7 or above

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://fortiguard.fortinet.com/psirt/FG-IR-24-261
N/A
Hyperlink: https://fortiguard.fortinet.com/psirt/FG-IR-24-261
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@fortinet.com
Published At:11 Mar, 2025 | 15:15
Updated At:11 Mar, 2025 | 15:15

An incorrect authorization vulnerability [CWE-863] in FortiSandbox 4.4.0 through 4.4.6 may allow a low priviledged administrator to execute elevated CLI commands via the GUI console menu.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-863Primarypsirt@fortinet.com
CWE ID: CWE-863
Type: Primary
Source: psirt@fortinet.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://fortiguard.fortinet.com/psirt/FG-IR-24-261psirt@fortinet.com
N/A
Hyperlink: https://fortiguard.fortinet.com/psirt/FG-IR-24-261
Source: psirt@fortinet.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

191Records found

CVE-2023-20975
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.00% / 0.07%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-25 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In getAvailabilityStatus of EnableContentCapturePreferenceController.java, there is a possible way to bypass DISALLOW_CONTENT_CAPTURE due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-250573776

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21670
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.57%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:39
Updated-07 Jan, 2025 | 19:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access control in GPU Subsystem

Memory Corruption in GPU Subsystem due to arbitrary command execution from GPU in privileged mode.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqam8255p_firmwaresm7325-ae_firmwaresa6150p_firmwaresm6250p_firmwareqcs610315_5g_iot_modem_firmwareqca8337qam8775psnapdragon_212_mobile_platformwcn3950_firmwaresa8150p_firmwaresm4450_firmwareqcs2290qca6595au_firmwaresa6155qca6335sm8350sdm670csra6620_firmwareqcs605_firmwarecsra6640_firmwarewcn685x-1qcs400_firmwaresm7350-ab_firmwaresda845_firmwaresnapdragonwear_4100\+_platformsm4375wcn3998qam8295pwcn3950qcn6024_firmwaresm4125wcn3660bsm7150-acqsm8350_firmwareqsm8350sm7315_firmwaresm7325-aesnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwaresm4250-aawcd9375_firmwarewcn3998_firmwareqca8081_firmwaresa6155_firmwaresm6225-adqca6420sda845snapdragon_auto_5g_modem-rf_firmwaresm6225-ad_firmwareqrb5165m_firmwareqrb5165_firmwareqca6698aqsa4155p_firmwaresa8155_firmwaresnapdragon_7c\+_gen3_computesm7250-ab_firmwareqca6430wcd9340sw5100qca6436sa6155pqca6698aq_firmwaresnapdragon_690_5g_mobile_platformmsm8905wcn685x-1_firmwaresm8150_firmwarewcd9341qam8775p_firmwaresa8255psnapdragon_ar2_gen1_platform_firmwareqca6696_firmwaresnapdragon_x12_lte_modemqca6797aqwcn3910_firmwaresm4350_firmwaresa8150psm8250-ac_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresm7225_firmwarewcn3988sd660_firmwaresm4250-aa_firmwaresa8195p_firmwaresm8475wcn6750_firmwaresm6125_firmwaresa8295p_firmwarewcn3610snapdragon_675_mobile_platform_firmwarec-v2x9150wcn3991qca8337_firmwarewcd9380_firmwaressg2125psdm429wsw5100psdm429sd670_firmwareqca6574wcd9380qcs410snapdragon_210_processorsm7150-aa_firmwaresxr1230pqcn9012_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qca6335_firmwaresm7225qcm4325_firmwareqcs605wcd9340_firmwarewsa8815sm6150-ac_firmwarewcn3910sdm429_firmwareqcs8250qca6426_firmwaresm4450wcn3660b_firmwarewcn3680qcn9024wcn3980_firmwaresd730snapdragon_x50_5g_modem-rf_system_firmwaresm7150-aasa8295psm8475_firmwarewcn6740_firmwaresm7125qcs4490_firmwaresnapdragon_xr2_5g_platformsnapdragon_x65_5g_modem-rf_systemar8031_firmwarewcn3680_firmwaresm7150-ab_firmwareqrb5165sm8350_firmwaresnapdragon_xr2\+_gen1_platformsdm660qca6797aq_firmwarewcn785x-1_firmwaresdm710sd670qcn9024_firmwareqcm4290_firmwaresnapdragon_x24_lte_modemwsa8832sw5100p_firmwareqcs610_firmwaresa6145par8031qcs4490qca6595_firmwaresa8145pqca6391_firmwaresa4150p_firmwarewcd9370_firmwareqm215_firmwaresm4350-ac_firmwaresdx55sd888_firmwaresm8250csra6640sa8155psnapdragon_695_5g_mobile_platformssg2115p_firmwareqcs8155_firmwareqam8255psa4155par8035_firmwareqcm2290sdm845_firmwarewcn3991_firmwarewsa8830snapdragon_662_mobile_platform_firmwaresxr2230p_firmwaresa8145p_firmwaresm6125snapdragon_x24_lte_modem_firmwareqcs2290_firmwareqam8650pwcn785x-5flight_rb5_5g_platformcsra6620flight_rb5_5g_platform_firmwaresm7250-ac_firmwareqcs4290qca6420_firmwareqca6390_firmwaresd730_firmwarewcd9370ssg2115pqca6426wcn3990_firmwareqrb5165n_firmwaresm8450qca9377sm8250-abwcd9385_firmwarewcd9326_firmwarewcn3615_firmwaresnapdragon_w5\+_gen1_wearable_platformqam8295p_firmwaresm7325-afqcn9011_firmwaresa8155snapdragon_x55_5g_modem-rf_systemmsm8905_firmwarewcn3680b_firmwaresdx55_firmwaresnapdragon_7c\+_gen3_compute_firmwaresnapdragon_212_mobile_platform_firmwarewcn3615qca6595ausm7325-af_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwaresm4350-acqrb5165nsnapdragon_680_4g_mobile_platform_firmwaresa6155p_firmwareqca6310snapdragon_x65_5g_modem-rf_system_firmwareqcs8155qcs6490qcs8550_firmwaresm8250_firmwaresm8250-acwcn3988_firmware315_5g_iot_modemqcn9074sa6145p_firmwareqm215sm6250sm7250-aasnapdragon_xr2\+_gen1_platform_firmwaresa8195psxr1120sdm710_firmwarewsa8810_firmwaresm4375_firmwaresm8450_firmwarewcd9326wcd9335sa8255p_firmwaresg4150pqca8081qcm4490qca6174a_firmwareqcs4290_firmwarewcd9385sxr2130_firmwareqcs6490_firmwaresnapdragon_x12_lte_modem_firmwaresm7150-abqca6390wcd9375ar8035aqt1000snapdragon_210_processor_firmwaresm6250_firmwaresnapdragon_662_mobile_platformwcn3620_firmwaresm8150wsa8815_firmwareqcm6490wsa8835_firmwarewcn3620sm7350-absxr1120_firmwaresa4150psg4150p_firmwarewcn785x-1qcm4325qcm2290_firmwarewcn3990sdm845sd865_5gsnapdragon_ar2_gen1_platformqca6595sm8350-ac_firmwaresm8150-acqcn9012sd888wsa8835sxr1230p_firmwaresdm429w_firmwarec-v2x9150_firmwaresnapdragon_auto_5g_modem-rfsm6250psxr2130ssg2125p_firmwareqca6574awcn685x-5_firmwareqca6174asm7325psdm670_firmwareqca6310_firmwaresm7325wcn6750sm7150-ac_firmwaresm7250-abqca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresxr2230psnapdragon_xr2_5g_platform_firmwareqca6574a_firmwareqrb5165mwcn785x-5_firmwaresm7315snapdragon_x55_5g_modem-rf_system_firmwaresm8250-ab_firmwareqca6391aqt1000_firmwareqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_w5\+_gen1_wearable_platform_firmwareqcm4290qcm6490_firmwarewsa8832_firmwaresnapdragon_xr1_platformwcn685x-5qcn9011qca6574ausa8155p_firmwareqcs8250_firmwarewcd9341_firmwarewsa8810sm7250-aa_firmwaresm7250-acsnapdragon_680_4g_mobile_platformsm8150-ac_firmwarewcn3680bsm8350-acqam8650p_firmwaresnapdragon_675_mobile_platformwcn6740qca6696qcs8550snapdragonwear_4100\+_platform_firmwaresm4350sm6150-acsm7125_firmwaresnapdragon_x50_5g_modem-rf_systemsa6150pqcn6024sm7250psw5100_firmwareqcn9074_firmwareqcs410_firmwareqcs400sdm660_firmwaresnapdragon_xr1_platform_firmwaresm7325_firmwareSnapdragon
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21390
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.34%
||
7 Day CHG~0.00%
Published-30 Oct, 2023 | 17:01
Updated-05 Sep, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Sim, there is a possible way to evade mobile preference restrictions due to a permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21245
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.08%
||
7 Day CHG~0.00%
Published-12 Jul, 2023 | 23:26
Updated-06 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In showNextSecurityScreenOrFinish of KeyguardSecurityContainerController.java, there is a possible way to access the lock screen during device setup due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21034
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.00% / 0.13%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-26 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of SensorService.cpp, there is a possible access of accurate sensor data due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-230358834

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-20971
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.61%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-25 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In removePermission of PermissionManagerServiceImpl.java, there is a possible way to obtain dangerous permissions without user consent due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21270
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.45%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 18:00
Updated-18 Dec, 2024 | 14:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In restorePermissionState of PermissionManagerServiceImpl.java, there is a possible way for an app to keep permissions that should be revoked due to incorrect permission flags cleared during an update. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndrioidandroid
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-14110
Matching Score-4
Assigner-Xiaomi Technology Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Xiaomi Technology Co., Ltd.
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.78%
||
7 Day CHG~0.00%
Published-18 Jan, 2022 | 16:51
Updated-04 Aug, 2024 | 12:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AX3600 router sensitive information leaked.There is an unauthorized interface through luci to obtain sensitive information and log in to the web background.

Action-Not Available
Vendor-n/aXiaomi
Product-ax3600_firmwareax3600miwifi6 AX3600
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-40529
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.1||HIGH
EPSS-0.03% / 7.63%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:39
Updated-03 Aug, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper access control in Kernel

Memory corruption due to improper access control in kernel while processing a mapping request from root process.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwaresnapdragon_850_mobile_compute_platform_firmwaresm7325-ae_firmwaresa6150p_firmwaresm6250p_firmwareqcs610sc8180x-ab_firmwareqca6431_firmwareqam8775pwcn3950_firmwaresc8180x\+sdx55sa8150p_firmwaresm4450_firmwareqcs2290qca6595au_firmwaresa6155qca6335sdm712sdm670sm8350csra6620_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwarewcn685x-1sm7350-ab_firmwaresm4375wcn3998sc8180xp-adwcd9371_firmwareqam8295pwcn3950sm4125sd_8_gen1_5g_firmwaresm6375_firmwaresm7150-acqsm8350_firmwareqsm8350sd460_firmwaresm7315_firmwaresm7325-aeqca6574au_firmwaresm4250-aawcd9375_firmwarewcn3998_firmwaresa6155_firmwaresm6225-adqca6420snapdragon_xr2\+_gen_1_platformsnapdragon_auto_5g_modem-rf_firmwaresc8180xp-afsmart_audio_400_platform_firmwarewcn3999sm6225-ad_firmwareqrb5165m_firmwareqrb5165_firmwareqca6698aqsc8180xp-aa_firmwareqcs6125sa4155p_firmwaresa8155_firmwarerobotics_rb3_platform_firmwaresd662_firmwaresm7250-ab_firmwareqca6430robotics_rb3_platformwcd9340sw5100qca6436sa6155pqca6698aq_firmwarewcn685x-1_firmwaresm8150_firmwarewcd9341qam8775p_firmwaresa8255pqca6431qca6696_firmwaresc8180xp-ab_firmwarewcd9371sc8180x-abqca6797aqwcn3910_firmwaresm4350_firmwaresd_8cxsa8150psm8250-ac_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwaresm7225_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3988sm4250-aa_firmwaresa8195p_firmwaresm8475wcn6750_firmwaresm6125_firmwaresa8295p_firmwaresnapdragon_675_mobile_platform_firmwaresm6375wcn3991wcd9380_firmwaressg2125psw5100psnapdragon_w5\+_gen_1_wearable_platformqca6564ausd670_firmwareqca6574snapdragon_7c\+_gen_3_computewcd9380sc8180xp-aaqcs410sm7150-aa_firmwaresxr1230pc-v2x_9150_firmwaresc8180xp-ad_firmwaresc8180x-ac_firmwareqcn9012_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qca6335_firmwaresm7225qcm4325_firmwarewcd9340_firmwarewsa8815sm6150-ac_firmwarewcn3910qcs8250qca6426_firmwaresm4450qca9984sc8180x-adwcn3980_firmwaresd730snapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresc7180-ac_firmwaresa8295psm7150-aasm6350sm8475_firmwarewcn6740_firmwareqca6421_firmwaresm7125qcs4490_firmwaresnapdragon_xr2_5g_platformar8031_firmwaresm7150-ab_firmwareqrb5165sm8350_firmwaresm6350_firmwareqca6797aq_firmwarewcn785x-1_firmwaresdm710sd670qca6564a_firmwareqcm4290_firmwarewsa8832sc8180xp-ac_firmwaresw5100p_firmwaresa8540pqcs610_firmwareqsm8250sa6145par8031qcs4490qca6595_firmwaresa8145psc8280xp-bbqca6391_firmwaresa4150p_firmwarewcd9370_firmwaresm4350-ac_firmwaresdx55sd888_firmwaresm8250csra6640sa8155psd675ssg2115p_firmwareqcs8155_firmwareqam8255psa4155par8035_firmwareqcm2290qsm8250_firmwarewcn3991_firmwarewsa8830snapdragon_662_mobile_platform_firmwaresxr2230p_firmwaresa8145p_firmwaresm6125sdm712_firmwaresnapdragon_850_mobile_compute_platformqcs2290_firmwareqam8650pwcn785x-5flight_rb5_5g_platformcsra6620flight_rb5_5g_platform_firmwaresc8280xp-bb_firmwaresm7250-ac_firmwareqcs4290qca6420_firmwaresc7180-acqca6390_firmwaresnapdragon_auto_4g_modem_firmwaresd730_firmwarewcd9370sd675_firmwaressg2115pqca6564qca6426sc8280xp-abwcn3990_firmwareqrb5165n_firmwareqca9984_firmwaresm8450sm8250-absd_8cx_firmwarewcd9385_firmwarewcd9326_firmwaresd662qam8295p_firmwaresm7325-afqcn9011_firmwaresa8155snapdragon_x55_5g_modem-rf_systemsa9000p_firmwaresdx55_firmwareqca6595ausm7325-af_firmwarewcn3999_firmwaresm7250p_firmwareqca6436_firmwaresm4350-acqrb5165nsnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa6155p_firmwareqca6310qcs8155sm6225qcs6490qcs8550_firmwaresm8250_firmwarevision_intelligence_300_platform_firmwaresm8250-acwcn3988_firmwareqcn9074sa6145p_firmwareqca6421sm7250-aasm6250c-v2x_9150sa8195psxr1120sdm710_firmwarewsa8810_firmwaresm4375_firmwarevision_intelligence_400_platformsm8450_firmwaresc7180-adwcd9326wcd9335snapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresg4150pqcm4490qca6174a_firmwareqcs4290_firmwarewcd9385sxr2130_firmwareqcs6490_firmwaresm7150-absc8180x-acqca6390wcd9375ar8035aqt1000sc8180x\+sdx55_firmwaresm6250_firmwarevision_intelligence_400_platform_firmwaresnapdragon_662_mobile_platformsm8150wsa8815_firmwareqcm6490wsa8835_firmwaresm7350-absxr1120_firmwareqca6564asa4150psg4150p_firmwarewcn785x-1qcm6125_firmwareqcm4325qcm2290_firmwaresnapdragon_845_mobile_platformwcn3990sd_675sd865_5gqca6595sm8350-ac_firmwaresm8150-acqcn9012sd888wsa8835sxr1230p_firmwaresc7180-ad_firmwaresa8540p_firmwaresnapdragon_auto_5g_modem-rfsd_8_gen1_5gsm6250psc8180xp-acsxr2130ssg2125p_firmwareqca6574asmart_audio_400_platformwcn685x-5_firmwaresc8180x-afqca6174asm7325psdm670_firmwareqca6310_firmwaresm7325wcn6750sm7150-ac_firmwaresa9000pqca6574_firmwaresm7250-absd855sm4125_firmwaresm7325p_firmwaresxr2230psnapdragon_xr2_5g_platform_firmwareqca6574a_firmwareqrb5165mwcn785x-5_firmwaresm7315snapdragon_x55_5g_modem-rf_system_firmwarevision_intelligence_300_platformsd460qca6391sm8250-ab_firmwaresc8280xp-ab_firmwareaqt1000_firmwareqcm4490_firmwaresnapdragon_845_mobile_platform_firmwaresnapdragon_auto_4g_modemqcm4290qcm6490_firmwarewsa8832_firmwaresnapdragon_xr1_platformwcn685x-5qcn9011sm6225_firmwaresc8180xp-af_firmwareqca6574ausa8155p_firmwareqcs8250_firmwarewcd9341_firmwareqcm6125wsa8810sm7250-aa_firmwaresc8180x-aa_firmwaresm7250-acsm8150-ac_firmwaresnapdragon_ar2_gen_1_platformsc8180x-aasm8350-acqca6564_firmwareqam8650p_firmwaresnapdragon_675_mobile_platformsc8180x-af_firmwarewcn6740qca6696qcs8550sm4350sm6150-acsm7125_firmwaresnapdragon_x50_5g_modem-rf_systemsa6150psc8180xp-absc8180x-ad_firmwaresm7250psw5100_firmwareqcn9074_firmwareqcs410_firmwaresnapdragon_xr1_platform_firmwaresm7325_firmwareSnapdragon
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-1164
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.4||HIGH
EPSS-0.04% / 8.77%
||
7 Day CHG~0.00%
Published-03 Mar, 2023 | 06:56
Updated-25 Nov, 2024 | 15:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
KylinSoft kylin-activation File Import improper authorization

A vulnerability was found in KylinSoft kylin-activation on KylinOS and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260.

Action-Not Available
Vendor-kylinosKylinSoft
Product-kylin_oskylin-activation
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-22938
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.34%
||
7 Day CHG~0.00%
Published-30 Jan, 2024 | 00:00
Updated-29 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure Permissions vulnerability in BossCMS v.1.3.0 allows a local attacker to execute arbitrary code and escalate privileges via the init function in admin.class.php component.

Action-Not Available
Vendor-bosscmsn/a
Product-bosscmsn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-45339
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.57%
||
7 Day CHG~0.00%
Published-27 Dec, 2021 | 12:57
Updated-04 Aug, 2024 | 04:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Privilege escalation vulnerability in Avast Antivirus prior to 20.4 allows a local user to gain elevated privileges by "hollowing" trusted process which could lead to the bypassing of Avast self-defense.

Action-Not Available
Vendor-avastn/a
Product-antivirusn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-12831
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-6.6||MEDIUM
EPSS-0.02% / 2.57%
||
7 Day CHG~0.00%
Published-20 Dec, 2024 | 00:05
Updated-03 Jan, 2025 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arista NG Firewall uvm_login Incorrect Authorization Privilege Escalation Vulnerability

Arista NG Firewall uvm_login Incorrect Authorization Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Arista NG Firewall. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the uvm_login module. The issue results from incorrect authorization. An attacker can leverage this to escalate privileges to resources normally protected from the user. Was ZDI-CAN-24324.

Action-Not Available
Vendor-Arista Networks, Inc.
Product-ng_firewallNG Firewall
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-1155
Matching Score-4
Assigner-National Instruments
ShareView Details
Matching Score-4
Assigner-National Instruments
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.80%
||
7 Day CHG~0.00%
Published-20 Feb, 2024 | 14:34
Updated-12 Feb, 2025 | 18:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect permissions for shared NI SystemLink Elixir based services

Incorrect permissions in the installation directories for shared SystemLink Elixir based services may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-emersonNI
Product-specification_compliance_managerflexloggersystemlink_serverlabview_nxgg_web_development_softwarestatic_test_software_suitedata_record_adsts_software_bundleSystemLink ServerFlexLogger
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-1156
Matching Score-4
Assigner-National Instruments
ShareView Details
Matching Score-4
Assigner-National Instruments
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.42%
||
7 Day CHG~0.00%
Published-20 Feb, 2024 | 14:37
Updated-12 Feb, 2025 | 18:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect directory permissions for the shared NI RabbitMQ service may allow a local authenticated user to read RabbitMQ configuration information and potentially enable escalation of privileges.

Action-Not Available
Vendor-emersonNIni
Product-specification_compliance_managerflexloggersystemlink_serverlabview_nxgg_web_development_softwarestatic_test_software_suitedata_record_adsts_software_bundleSystemLink ServerFlexLoggersystemlinkflexlogger
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-31646
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.65%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 17:07
Updated-30 Dec, 2024 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.

Action-Not Available
Vendor-HP Inc.
Product-zbook_studio_g5_firmwareprodesk_600_g2_desktop_minielitedesk_800_g8_tower_firmwarez2_mini_g5_workstation_firmwareelitebook_845_g8eliteone_1000_g2_23.8-in_all-in-one_business_firmwareprodesk_600_g5_small_form_factorprobook_640_g7zhan_66_pro_g3_24_all-in-oneprodesk_680_g2_microtowerengage_flex_pro-c_retail_systemzhan_66_pro_14_g2probook_630_g8_firmwareelitebook_x360_830_g5_firmwareelitebook_x360_830_g5elitedesk_880_g8_towerelitebook_1040_g3_firmwareprodesk_400_g5_desktop_minielite_x2_1013_g3pro_x360_fortis_g10engage_flex_pro-c_retail_system_firmwareeliteone_800_g3_23.8_non-touch_all-in-one_business_firmwareelite_x360_830_g9_2-in-1_firmwareproone_400_g6_24_all-in-one_firmwareprodesk_400_g5_small_form_factorprobook_445_g6pro_tower_400_g9_firmwareelitebook_840_g7_firmwareprobook_445_g7prodesk_400_g5_desktop_mini_firmwareeliteone_800_g3_23.8-inch_touch_gpu_all-in-onezbook_17_g6probook_650_g8_firmwarezbook_studio_g9elitebook_630_g9_firmwareeliteone_800_g4_23.8-inch_non-touch_gpu_all-in-onezbook_fury_17_g7_firmwareprobook_645_g4_firmwarezhan_66_pro_14_g3elitebook_836_g6prodesk_600_g4_small_form_factorzbook_17_g6_firmwarez2_tower_g8_workstation_firmwareelitedesk_805_g6_small_form_factoreliteone_800_g3_23.8-inch_touch_all-in-one_firmwarez2_tower_g8_workstationz2_tower_g5_workstation_firmwareelitebook_850_g5_firmwareeliteone_800_g3_23.8-inch_non-touch_all-in-oneelite_tower_600_g9_firmwarez2_small_form_factor_g8_workstationelite_slice_g2_firmwareelitebook_x360_1030_g7_firmwareelitedesk_800_g4_tower_firmwareelite_tower_880_g9_firmwarezbook_fury_15_g7prodesk_600_g6_microtower_firmwareelitedesk_800_g8_desktop_mini_firmwarezhan_66_pro_15_g3zbook_power_g9elitedesk_800_g8_small_form_factor_firmwareprodesk_400_g4_desktop_mini_firmwareelitebook_x360_1040_g8_firmwaremt46_mobile_thin_client_firmwareelitebook_865_g9elitedesk_800_g5_desktop_minielitedesk_705_g3probook_x360_11_g6_eeprodesk_405_g6_desktop_mini_firmwareeliteone_1000_g1_23.8-in_all-in-one_businesselitebook_840_g5_firmwareelitedesk_800_65w_g2_desktop_minipro_tower_480_g9prodesk_400_g5_microtower_firmwareelitebook_835_g8eliteone_1000_g2_23.8-in_all-in-one_businesselitebook_x360_1030_g8probook_640_g5proone_600_g3_21.5-inch_non-touch_all-in-one_firmwareprodesk_680_g3_microtowerprodesk_405_g4_small_form_factor_firmwareelitedesk_800_95w_g4_desktop_miniprodesk_600_g2_desktop_mini_firmwareprobook_x360_11_g4_ee_firmwareeliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_business_firmwareelite_dragonfly_g2elitebook_830_g6z2_small_form_factor_g4_workstationelite_x360_1040_g9_2-in-1probook_430_g6_firmwareeliteone_800_g5_23.8-inch_all-in-oneprobook_650_g5_firmwarez1_entry_tower_g5_workstationprobook_x360_435_g7_firmwareprobook_x360_11_g6_ee_firmwareelite_x2_1012_g2_firmwareproone_400_g4_20-inch_non-touch_all-in-one_business_firmwarezbook_fury_17_g8z1_entry_tower_g5_workstation_firmwareprodesk_400_g6_microtowerelitedesk_800_g4_small_form_factorelitedesk_705_g4_small_form_factor_firmwareprodesk_600_g6_desktop_minielitebook_x360_830_g7probook_445_g7_firmwareelitebook_x360_1040_g8elitedesk_705_g3_firmwareprobook_450_g5probook_450_g6_firmwareprobook_455_g5probook_430_g5_firmwareelitebook_836_g5_firmwareprobook_650_g7_firmwarezbook_17_g5proone_440_g4_23.8-inch_non-touch_all-in-one_business_firmwarezhan_66_pro_15_g3_firmwareproone_400_g4_23.8-inch_non-touch_all-in-one_businessprobook_440_g7elite_folio_2-in-1elitedesk_705_g4_small_form_factorprodesk_400_g4_microtower_firmwareelite_tower_880_g9z2_tower_g5_workstationelitedesk_800_35w_g2_desktop_minielite_x2_1012_g1_firmwareproone_600_g5_21.5-in_all-in-one_business_firmwareelitebook_865_g9_firmwareelite_tower_600_g9proone_400_g3_20-inch_touch_all-in-one_firmwareelitebook_830_g8_firmwareelitedesk_800_g5_tower_firmwareprodesk_600_g3_microtowerprodesk_400_g4_microtowerpro_tower_400_g9prodesk_480_g6_microtower_firmwareelitebook_845_g9zbook_firefly_14_g7zbook_fury_15_g8eliteone_840_23.8_inch_g9_all-in-oneprodesk_405_g6_desktop_miniproone_400_g2_20-inch_touch_all-in-one_firmwaremp9_g4_retail_systemz2_small_form_factor_g5_workstationprobook_445_g8elitebook_855_g7_firmwareelitebook_x360_830_g8probook_470_g5_firmwareelitedesk_805_g8_small_form_factorelitebook_860_g9_firmwareprobook_455_g7elite_tower_800_g9_firmwareproone_400_g2_20-inch_touch_all-in-oneelitebook_x360_830_g6probook_635_aero_g8_firmwareprodesk_405_g4_desktop_mini_firmwareelitebook_835_g9_firmwarepro_sff_400_g9probook_445_g6_firmwareprobook_445_g9proone_440_g6_24_all-in-one_firmwareprodesk_600_g3_desktop_miniz2_small_form_factor_g5_workstation_firmwareelitebook_645_g9_firmwareelitedesk_800_g6_small_form_factorz2_tower_g4_workstationelitedesk_800_65w_g3_desktop_mini_firmwarezbook_studio_g7elitebook_835_g8_firmwareeliteone_800_g4_23.8-in_all-in-one_businesselitedesk_800_g5_desktop_mini_firmwareproone_400_g6_20_all-in-onezbook_fury_15_g7_firmwarezbook_power_g8_firmwareeliteone_800_g3_23.8_non-touch_all-in-one_businessprobook_640_g8_firmwarezbook_14u_g5_firmwareprodesk_480_g6_microtowermt45_mobile_thin_client_firmwareeliteone_1000_g2_27-in_4k_uhd_all-in-one_businessz1_g9_towerprodesk_600_g2_small_form_factorelite_mini_600_g9elitebook_845_g7_firmwareprodesk_600_g4_small_form_factor_firmwarez2_mini_g5_workstationzhan_66_pro_a_14_g5elitebook_1040_g4probook_x360_11_g3_eeelitebook_735_g5eliteone_800_g3_23.8-inch_touch_all-in-oneelitebook_1040_g9_firmwareelitebook_735_g5_firmwareelitedesk_800_g8_desktop_miniprodesk_400_g6_desktop_mini_firmwareelitebook_846_g5_firmwareelite_mini_800_g9zbook_fury_17_g7proone_440_g5_23.8-in_all-in-one_businessprodesk_400_g6_microtower_firmwareprobook_fortis_g10elitebook_835_g7proone_400_g3_20-inch_touch_all-in-onezbook_14u_g6proone_400_g4_20-inch_non-touch_all-in-one_businesselitebook_755_g5zbook_15u_g6_firmwareelitedesk_800_g4_towerprobook_440_g8prodesk_400_g4_desktop_minielitebook_735_g6proone_400_g6_20_all-in-one_firmwareprobook_455_g9elitedesk_800_g2_small_form_factor_firmwareprobook_640_g5_firmwareprobook_440_g6proone_400_g5_23.8-inch_all-in-one_businessprobook_450_g6z1_g8_towerprobook_630_g8probook_650_g8probook_650_g4_firmwarezbook_firefly_15_g8_firmwareprobook_450_g9zhan_x_13_g2zbook_studio_g5proone_600_g2_21.5-inch_non-touch_all-in-oneelitebook_860_g9elitedesk_800_65w_g3_desktop_minieliteone_800_g4_23.8-inch_touch_gpu_all-in-oneelite_x360_830_g9_2-in-1eliteone_1000_g2_34-in_curved_all-in-one_businessprodesk_600_g5_desktop_mini_firmwareprobook_430_g8z2_mini_g4_workstation_firmwaremt44_mobile_thin_clientprodesk_680_g3_microtower_firmwareelitebook_x360_1040_g7elitebook_830_g9elite_x2_g4zbook_15_g5probook_455_g8prodesk_600_g4_microtower_firmwareelitebook_830_g8elitebook_840_g9_firmwareprodesk_400_g7_microtowerprodesk_600_g6_small_form_factor_firmwareelitedesk_800_g6_desktop_mini_firmwarezhan_66_pro_a_14_g4eliteone_1000_g2_23.8-in_touch_all-in-one_business_firmwareelitebook_x360_830_g8_firmwareeliteone_1000_g1_34-in_curved_all-in-one_business_firmwarezhan_66_pro_a_14_g3_firmwareprobook_445_g8_firmwarezhan_66_pro_14_g4elite_dragonfly_g3zhan_66_pro_g3_22_all-in-oneeliteone_800_g3_23.8-inch_touch_gpu_all-in-one_firmwareprobook_455_g5_firmwareprodesk_480_g5_microtower_firmwareengage_one_pro_aio_systemelitebook_830_g7elitebook_640_g9probook_455_g6_firmwareprodesk_600_g4_microtowerprodesk_405_g4_small_form_factormp9_g2_retail_system_firmwareelite_slicez2_mini_g4_workstationelitedesk_705_g4_workstation_firmwareprobook_440_g6_firmwareelitebook_x360_830_g6_firmwareelitebook_830_g6_firmwareelite_tower_680_g9elitedesk_800_65w_g4_desktop_mini_firmwarezhan_66_pro_g1_firmwareeliteone_800_g6_24_all-in-oneelite_x2_g4_firmwareeliteone_800_g4_23.8-inch_non-touch_all-in-one_firmwarezhan_66_pro_13_g2_firmwareelitebook_x360_830_g7_firmwareengage_go_10_mobile_system_firmwareelite_dragonfly_g3_firmwareelite_dragonfly_g2_firmwareprobook_x360_11_g7_eeelitebook_x360_1030_g3_firmwareelitebook_1030_g1elite_mini_800_g9_firmwareelitebook_645_g9zbook_firefly_16_g9_firmwareproone_400_g5_23.8-inch_all-in-one_business_firmwareelite_sff_600_g9elitedesk_705_g4_microtower_firmwarezhan_66_pro_15_g2_firmwarezhan_66_pro_14_g4_firmwarezbook_firefly_15_g7elitedesk_800_35w_g4_desktop_mini_firmwareproone_440_g6_24_all-in-onezbook_power_g9_firmwareelitebook_845_g8_firmwareprobook_640_g8elitebook_830_g9_firmwarezhan_66_pro_g1elitedesk_705_g4_microtowereliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_firmwarerp9_g1_retail_system_firmwareelitebook_840_g7elitebook_1050_g1elitedesk_800_g6_small_form_factor_firmwareengage_one_aio_system_firmwaredragonfly_folio_g3_2-in-1prodesk_400_g7_microtower_firmwareelitebook_850_g5zbook_power_g7elite_mini_600_g9_firmwareeliteone_1000_g1_23.8-in_touch_all-in-one_businesselitebook_630_g9elitebook_x360_1040_g6_firmwareelitebook_x360_1030_g4_firmwareprobook_x360_11_g3_ee_firmwarezhan_66_pro_14_g3_firmwareprodesk_400_g5_microtowerproone_600_g2_21.5-inch_touch_all-in-oneelite_folio_2-in-1_firmwareproone_600_g2_21.5-inch_touch_all-in-one_firmwarezhan_66_pro_a_14_g3elitedesk_800_35w_g3_desktop_mini_firmwarezbook_power_g8probook_440_g8_firmwareelitedesk_880_g5_tower_firmwareprodesk_600_g2_microtowerzbook_15_g6_firmwareelite_sff_800_g9elitedesk_880_g6_tower_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_businessprodesk_600_g4_desktop_minizbook_fury_16_g9proone_400_g3_20-inch_non-touch_all-in-onezbook_create_g7_firmwareproone_440_g4_23.8-inch_non-touch_all-in-one_businessprobook_fortis_g10_firmwareelitebook_840_g5mt46_mobile_thin_clientprobook_440_g5proone_440_23.8_inch_g9_all-in-oneprodesk_600_g2_microtower_firmwareeliteone_800_g6_27_all-in-oneproone_600_g5_21.5-in_all-in-one_businesszhan_66_pro_a_14_g4_firmwarezhan_66_pro_g3_24_all-in-one_firmwareelitebook_1050_g1_firmwareelitebook_755_g5_firmwareelitedesk_800_65w_g2_desktop_mini_firmwaredragonfly_folio_g3_2-in-1_firmwareprobook_640_g4probook_455_g9_firmwareproone_600_g3_21.5-inch_non-touch_all-in-oneprobook_445r_g6_firmwareelitedesk_800_95w_g4_desktop_mini_firmwareprodesk_400_g5_small_form_factor_firmwareprodesk_600_g3_small_form_factor_firmwareprodesk_600_g6_desktop_mini_firmwareprodesk_600_g6_firmwarezhan_66_pro_13_g2elite_dragonflyprobook_440_g5_firmwareprodesk_400_g6_small_form_factor_firmwareprodesk_600_g6_small_form_factorelite_dragonfly_maxeliteone_800_g3_23.8-inch_non-touch_all-in-one_firmwareproone_400_g3_20-inch_non-touch_all-in-one_firmwareelitedesk_800_g6_desktop_minizbook_14u_g6_firmwareprobook_445r_g6mt45_mobile_thin_clientprodesk_400_g6_small_form_factorzbook_15_g6eliteone_800_g8_27_all-in-onez2_small_form_factor_g4_workstation_firmwareelitebook_835_g7_firmwareelitebook_745_g5_firmwareelitebook_850_g6_firmwareelitebook_1040_g3probook_430_g8_firmwareprodesk_405_g6_small_form_factor_firmwareelitedesk_800_g5_towerprobook_fortis_g9_firmwareeliteone_800_g4_23.8-inch_touch_all-in-oneprodesk_405_g4_desktop_miniprobook_470_g5z1_g9_tower_firmwareelite_x2_1012_g1zbook_firefly_16_g9elitebook_840_g8probook_640_g4_firmwareelitebook_846_g5z2_small_form_factor_g8_workstation_firmwareprobook_455r_g6_firmwareproone_600_g4_21.5-inch_touch_all-in-one_business_firmwareelite_x360_1040_g9_2-in-1_firmwareelitedesk_800_g2_small_form_factorelitedesk_800_g6_towerengage_go_mobile_systemeliteone_1000_g2_34-in_curved_all-in-one_business_firmwarezbook_17_g5_firmwareproone_440_23.8_inch_g9_all-in-one_firmwareelitedesk_800_65w_g4_desktop_minielitebook_830_g5prodesk_480_g7_firmwareelitebook_640_g9_firmwareelitebook_x360_1040_g6elitebook_840_g6_firmwarezhan_66_pro_15_g2prodesk_400_g4_small_form_factormt44_mobile_thin_client_firmwareelitebook_735_g6_firmwareelitedesk_805_g6_desktop_minizbook_firefly_14_g7_firmwarez1_entry_tower_g6_workstationelitebook_745_g5probook_440_g9eliteone_800_g2_23-inch_touch_all-in-one_firmwareelitedesk_800_g4_workstationpro_x360_fortis_g9_firmwareelitebook_855_g8elitedesk_705_g4_desktop_mini_firmwareelitebook_1030_g1_firmwareelitedesk_805_g8_desktop_mini_firmwareelitedesk_800_g4_workstation_firmwareelitebook_745_g6_firmwareelite_sff_800_g9_firmwareelitedesk_800_g5_small_form_factor_firmwareelitedesk_880_g5_towerelitedesk_800_g4_small_form_factor_firmwareeliteone_800_g8_24_all-in-one_firmwareeliteone_800_g6_24_all-in-one_firmwareelitebook_836_g6_firmwareelitebook_x360_1030_g7probook_x360_11_g5_eeprobook_440_g9_firmwareelitebook_x360_1040_g7_firmwareprobook_x360_440_g1mp9_g2_retail_systemelitedesk_880_g4_towereliteone_800_g4_23.8-inch_non-touch_all-in-oneelitedesk_880_g8_tower_firmwareelite_tower_800_g9elitebook_x360_1040_g5prodesk_400_g3_desktop_mini_firmwareelitedesk_800_g3_tower_firmwareeliteone_800_g3_23.8-inch_non-touch_gpu_all-in-oneeliteone_840_23.8_inch_g9_all-in-one_firmwarezbook_fury_17_g8_firmwareelitebook_850_g8elitebook_835_g9elite_sff_600_g9_firmwareprodesk_680_g4_microtower_firmwareelitedesk_705_g4_desktop_minielitebook_x360_1030_g4eliteone_800_g6_27_all-in-one_firmwareprodesk_400_g3_desktop_minirp9_g1_retail_systemprodesk_680_g2_microtower_firmwareprobook_x360_440_g1_firmwareprodesk_680_g4_microtowerengage_one_aio_systemzbook_15_g5_firmwareeliteone_800_g2_23-inch_non-touch_all-in-one_firmwarez1_entry_tower_g6_workstation_firmwareprobook_455_g8_firmwareprobook_x360_435_g8probook_640_g7_firmwareelitedesk_805_g6_desktop_mini_firmwareelitebook_840_g6eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_firmwareengage_flex_mini_retail_system_firmwareelitedesk_880_g3_tower_firmwareprobook_455_g6elitebook_850_g8_firmwareelite_x2_g8probook_x360_11_g4_eezbook_studio_g9_firmwareprobook_450_g8elitedesk_800_g3_towereliteone_800_g8_24_all-in-oneelitedesk_705_g5_small_form_factor_firmwarezbook_studio_g8_firmwareprodesk_600_g3_small_form_factorprodesk_480_g7prodesk_600_g5_microtowerelitebook_840_aero_g8_firmwareprodesk_680_g6elite_x2_1012_g2proone_400_g4_23.8-inch_non-touch_all-in-one_business_firmwareprobook_450_g9_firmwareeliteone_1000_g1_34-in_curved_all-in-one_businessprobook_445_g9_firmwareelitebook_840_g9prodesk_600_g5_desktop_miniprodesk_600_g2_small_form_factor_firmwareelitedesk_800_g8_small_form_factorprodesk_400_g7_small_form_factorzbook_studio_x360_g5zbook_15u_g6zbook_studio_x360_g5_firmwareproone_400_g6_24_all-in-oneprodesk_600_g5_small_form_factor_firmwareengage_go_10_mobile_systemprodesk_480_g4_microtowerelitedesk_800_35w_g3_desktop_minizbook_firefly_15_g8eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_firmwareproone_400_g2_20-inch_non-touch_all-in-one_firmwareelite_dragonfly_max_firmwarepro_x360_fortis_g10_firmwareprobook_x360_435_g8_firmwarezbook_studio_g7_firmwarezbook_firefly_15_g7_firmwareeliteone_800_g4_23.8-in_all-in-one_business_firmwareengage_one_pro_aio_system_firmwareprodesk_400_g7_small_form_factor_firmwarezbook_15u_g5elitebook_855_g8_firmwareproone_400_g5_20-inch_all-in-one_business_firmwareeliteone_800_g5_23.8-in_all-in-oneelite_x2_1013_g3_firmwareprobook_x360_435_g7elitedesk_705_g5_desktop_minielitebook_830_g7_firmwareengage_go_mobile_system_firmwarepro_x360_fortis_g9elitebook_850_g6probook_450_g7prodesk_680_g6_firmwareproone_440_g5_23.8-in_all-in-one_business_firmwareproone_600_g6_22_all-in-onezhan_66_pro_a_14_g5_firmwareprobook_450_g7_firmwareeliteone_800_g2_23-inch_non-touch_all-in-onepro_mini_400_g9zbook_fury_15_g8_firmwareelitedesk_800_g8_towerelite_tower_680_g9_firmwareprobook_650_g4zbook_fury_16_g9_firmwareelitedesk_705_g5_small_form_factorprobook_650_g5z2_tower_g4_workstation_firmwareeliteone_1000_g1_23.8-in_all-in-one_business_firmwareelitedesk_800_g3_small_form_factorelitedesk_805_g6_small_form_factor_firmwareprodesk_405_g8_desktop_mini_firmwarezbook_create_g7zhan_66_pro_14_g2_firmwareprodesk_405_g8_small_form_factoreliteone_1000_g2_23.8-in_touch_all-in-one_businessprodesk_405_g8_desktop_minielitebook_745_g6elitebook_650_g9_firmwareprobook_430_g6eliteone_800_g5_23.8-inch_all-in-one_firmwareprodesk_480_g5_microtowerengage_flex_pro_retail_system_firmwareelitebook_1040_g9elitebook_x360_1030_g3zhan_66_pro_g5_firmwareprodesk_600_g5_microtower_firmwarezhan_66_pro_g3_22_all-in-one_firmwareprodesk_480_g4_microtower_firmwareprodesk_600_g6zhan_x_13_g2_firmwareelitedesk_880_g3_towerprodesk_600_g6_microtowerpro_mini_400_g9_firmwareprobook_455r_g6probook_430_g7elitebook_650_g9prodesk_405_g8_small_form_factor_firmwareprobook_450_g8_firmwarepro_sff_400_g9_firmwareelitebook_836_g5elitedesk_880_g4_tower_firmwareproone_600_g2_21.5-inch_non-touch_all-in-one_firmwareproone_400_g5_20-inch_all-in-one_businesselitebook_855_g7elitedesk_800_35w_g2_desktop_mini_firmwareprobook_x360_11_g7_ee_firmwareproone_400_g2_20-inch_non-touch_all-in-oneprodesk_400_g6_desktop_minielitedesk_800_g6_tower_firmwareelitedesk_880_g6_towerprobook_650_g7probook_455_g7_firmwareprodesk_405_g6_small_form_factorelite_dragonfly_firmwareproone_480_g3_20-inch_non-touch_all-in_oneelitebook_840_g8_firmwarepro_tower_480_g9_firmwareelitebook_850_g7zbook_firefly_14_g8elitebook_x360_1040_g5_firmwareprobook_430_g5probook_430_g7_firmwarezbook_power_g7_firmwareelitedesk_705_g5_desktop_mini_firmwareprobook_x360_11_g5_ee_firmwareprodesk_600_g3_microtower_firmwarezbook_firefly_14_g8_firmwareeliteone_800_g5_23.8-in_all-in-one_firmwareelite_slice_g2elitebook_845_g7elitebook_850_g7_firmwareelitebook_655_g9elitebook_1040_g4_firmwareelitebook_840_aero_g8probook_450_g5_firmwareelitedesk_800_35w_g4_desktop_miniprodesk_400_g4_small_form_factor_firmwareelite_x2_g8_firmwareelitedesk_800_g3_small_form_factor_firmwareeliteone_800_g8_27_all-in-one_firmwareproone_480_g3_20-inch_non-touch_all-in_one_firmwarezbook_14u_g5elitebook_x360_1030_g8_firmwarezbook_firefly_14_g9eliteone_1000_g1_23.8-in_touch_all-in-one_business_firmwaremp9_g4_retail_system_firmwareelitebook_840r_g4probook_645_g4elitedesk_800_g5_small_form_factorelite_slice_firmwareelitedesk_705_g4_workstationelitedesk_805_g8_desktop_miniz1_g8_tower_firmwareengage_flex_mini_retail_systemeliteone_800_g4_23.8-inch_touch_all-in-one_firmwarezbook_studio_g8elitebook_845_g9_firmwareprobook_635_aero_g8probook_440_g7_firmwareprodesk_600_g3_desktop_mini_firmwarezbook_15u_g5_firmwareproone_600_g6_22_all-in-one_firmwareelitebook_655_g9_firmwareelitedesk_805_g8_small_form_factor_firmwareengage_flex_pro_retail_systemelitebook_830_g5_firmwareelitebook_840r_g4_firmwarezhan_66_pro_g5eliteone_800_g2_23-inch_touch_all-in-onezbook_firefly_14_g9_firmwareproone_600_g4_21.5-inch_touch_all-in-one_businessprodesk_600_g4_desktop_mini_firmwareprobook_fortis_g9HP PC BIOS
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-31644
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.65%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 17:06
Updated-30 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.

Action-Not Available
Vendor-HP Inc.
Product-zbook_studio_g5_firmwareprodesk_600_g2_desktop_minielitedesk_800_g8_tower_firmwarez2_mini_g5_workstation_firmwareelitebook_845_g8eliteone_1000_g2_23.8-in_all-in-one_business_firmwareprodesk_600_g5_small_form_factorprobook_640_g7zhan_66_pro_g3_24_all-in-oneprodesk_680_g2_microtowerengage_flex_pro-c_retail_systemzhan_66_pro_14_g2probook_630_g8_firmwareelitebook_x360_830_g5_firmwareelitebook_x360_830_g5elitedesk_880_g8_towerelitebook_1040_g3_firmwareprodesk_400_g5_desktop_minielite_x2_1013_g3pro_x360_fortis_g10engage_flex_pro-c_retail_system_firmwareeliteone_800_g3_23.8_non-touch_all-in-one_business_firmwareelite_x360_830_g9_2-in-1_firmwareproone_400_g6_24_all-in-one_firmwareprodesk_400_g5_small_form_factorprobook_445_g6pro_tower_400_g9_firmwareelitebook_840_g7_firmwareprobook_445_g7prodesk_400_g5_desktop_mini_firmwareeliteone_800_g3_23.8-inch_touch_gpu_all-in-onezbook_17_g6probook_650_g8_firmwarezbook_studio_g9elitebook_630_g9_firmwareeliteone_800_g4_23.8-inch_non-touch_gpu_all-in-onezbook_fury_17_g7_firmwareprobook_645_g4_firmwarezhan_66_pro_14_g3elitebook_836_g6prodesk_600_g4_small_form_factorzbook_17_g6_firmwarez2_tower_g8_workstation_firmwareelitedesk_805_g6_small_form_factoreliteone_800_g3_23.8-inch_touch_all-in-one_firmwarez2_tower_g8_workstationz2_tower_g5_workstation_firmwareelitebook_850_g5_firmwareeliteone_800_g3_23.8-inch_non-touch_all-in-oneelite_tower_600_g9_firmwarez2_small_form_factor_g8_workstationelite_slice_g2_firmwareelitebook_x360_1030_g7_firmwareelitedesk_800_g4_tower_firmwareelite_tower_880_g9_firmwarezbook_fury_15_g7prodesk_600_g6_microtower_firmwareelitedesk_800_g8_desktop_mini_firmwarezhan_66_pro_15_g3zbook_power_g9elitedesk_800_g8_small_form_factor_firmwareprodesk_400_g4_desktop_mini_firmwareelitebook_x360_1040_g8_firmwaremt46_mobile_thin_client_firmwareelitebook_865_g9elitedesk_800_g5_desktop_minielitedesk_705_g3probook_x360_11_g6_eeprodesk_405_g6_desktop_mini_firmwareeliteone_1000_g1_23.8-in_all-in-one_businesselitebook_840_g5_firmwareelitedesk_800_65w_g2_desktop_minipro_tower_480_g9prodesk_400_g5_microtower_firmwareelitebook_835_g8eliteone_1000_g2_23.8-in_all-in-one_businesselitebook_x360_1030_g8probook_640_g5proone_600_g3_21.5-inch_non-touch_all-in-one_firmwareprodesk_680_g3_microtowerprodesk_405_g4_small_form_factor_firmwareelitedesk_800_95w_g4_desktop_miniprodesk_600_g2_desktop_mini_firmwareprobook_x360_11_g4_ee_firmwareeliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_business_firmwareelite_dragonfly_g2elitebook_830_g6z2_small_form_factor_g4_workstationelite_x360_1040_g9_2-in-1probook_430_g6_firmwareeliteone_800_g5_23.8-inch_all-in-oneprobook_650_g5_firmwarez1_entry_tower_g5_workstationprobook_x360_435_g7_firmwareprobook_x360_11_g6_ee_firmwareelite_x2_1012_g2_firmwareproone_400_g4_20-inch_non-touch_all-in-one_business_firmwarezbook_fury_17_g8z1_entry_tower_g5_workstation_firmwareprodesk_400_g6_microtowerelitedesk_800_g4_small_form_factorelitedesk_705_g4_small_form_factor_firmwareprodesk_600_g6_desktop_minielitebook_x360_830_g7probook_445_g7_firmwareelitebook_x360_1040_g8elitedesk_705_g3_firmwareprobook_450_g5probook_450_g6_firmwareprobook_455_g5probook_430_g5_firmwareelitebook_836_g5_firmwareprobook_650_g7_firmwarezbook_17_g5proone_440_g4_23.8-inch_non-touch_all-in-one_business_firmwarezhan_66_pro_15_g3_firmwareproone_400_g4_23.8-inch_non-touch_all-in-one_businessprobook_440_g7elite_folio_2-in-1elitedesk_705_g4_small_form_factorprodesk_400_g4_microtower_firmwareelite_tower_880_g9z2_tower_g5_workstationelitedesk_800_35w_g2_desktop_minielite_x2_1012_g1_firmwareproone_600_g5_21.5-in_all-in-one_business_firmwareelitebook_865_g9_firmwareelite_tower_600_g9proone_400_g3_20-inch_touch_all-in-one_firmwareelitebook_830_g8_firmwareelitedesk_800_g5_tower_firmwareprodesk_600_g3_microtowerprodesk_400_g4_microtowerpro_tower_400_g9prodesk_480_g6_microtower_firmwareelitebook_845_g9zbook_firefly_14_g7zbook_fury_15_g8eliteone_840_23.8_inch_g9_all-in-oneprodesk_405_g6_desktop_miniproone_400_g2_20-inch_touch_all-in-one_firmwaremp9_g4_retail_systemz2_small_form_factor_g5_workstationprobook_445_g8elitebook_855_g7_firmwareelitebook_x360_830_g8probook_470_g5_firmwareelitedesk_805_g8_small_form_factorelitebook_860_g9_firmwareprobook_455_g7elite_tower_800_g9_firmwareproone_400_g2_20-inch_touch_all-in-oneelitebook_x360_830_g6probook_635_aero_g8_firmwareprodesk_405_g4_desktop_mini_firmwareelitebook_835_g9_firmwarepro_sff_400_g9probook_445_g6_firmwareprobook_445_g9proone_440_g6_24_all-in-one_firmwareprodesk_600_g3_desktop_miniz2_small_form_factor_g5_workstation_firmwareelitebook_645_g9_firmwareelitedesk_800_g6_small_form_factorz2_tower_g4_workstationelitedesk_800_65w_g3_desktop_mini_firmwarezbook_studio_g7elitebook_835_g8_firmwareeliteone_800_g4_23.8-in_all-in-one_businesselitedesk_800_g5_desktop_mini_firmwareproone_400_g6_20_all-in-onezbook_fury_15_g7_firmwarezbook_power_g8_firmwareeliteone_800_g3_23.8_non-touch_all-in-one_businessprobook_640_g8_firmwarezbook_14u_g5_firmwareprodesk_480_g6_microtowermt45_mobile_thin_client_firmwareeliteone_1000_g2_27-in_4k_uhd_all-in-one_businessz1_g9_towerprodesk_600_g2_small_form_factorelite_mini_600_g9elitebook_845_g7_firmwareprodesk_600_g4_small_form_factor_firmwarez2_mini_g5_workstationzhan_66_pro_a_14_g5elitebook_1040_g4probook_x360_11_g3_eeelitebook_735_g5eliteone_800_g3_23.8-inch_touch_all-in-oneelitebook_1040_g9_firmwareelitebook_735_g5_firmwareelitedesk_800_g8_desktop_miniprodesk_400_g6_desktop_mini_firmwareelitebook_846_g5_firmwareelite_mini_800_g9zbook_fury_17_g7proone_440_g5_23.8-in_all-in-one_businessprodesk_400_g6_microtower_firmwareprobook_fortis_g10elitebook_835_g7proone_400_g3_20-inch_touch_all-in-onezbook_14u_g6proone_400_g4_20-inch_non-touch_all-in-one_businesselitebook_755_g5zbook_15u_g6_firmwareelitedesk_800_g4_towerprobook_440_g8prodesk_400_g4_desktop_minielitebook_735_g6proone_400_g6_20_all-in-one_firmwareprobook_455_g9elitedesk_800_g2_small_form_factor_firmwareprobook_640_g5_firmwareprobook_440_g6proone_400_g5_23.8-inch_all-in-one_businessprobook_450_g6z1_g8_towerprobook_630_g8probook_650_g8probook_650_g4_firmwarezbook_firefly_15_g8_firmwareprobook_450_g9zhan_x_13_g2zbook_studio_g5proone_600_g2_21.5-inch_non-touch_all-in-oneelitebook_860_g9elitedesk_800_65w_g3_desktop_minieliteone_800_g4_23.8-inch_touch_gpu_all-in-oneelite_x360_830_g9_2-in-1eliteone_1000_g2_34-in_curved_all-in-one_businessprodesk_600_g5_desktop_mini_firmwareprobook_430_g8z2_mini_g4_workstation_firmwaremt44_mobile_thin_clientprodesk_680_g3_microtower_firmwareelitebook_x360_1040_g7elitebook_830_g9elite_x2_g4zbook_15_g5probook_455_g8prodesk_600_g4_microtower_firmwareelitebook_830_g8elitebook_840_g9_firmwareprodesk_400_g7_microtowerprodesk_600_g6_small_form_factor_firmwareelitedesk_800_g6_desktop_mini_firmwarezhan_66_pro_a_14_g4eliteone_1000_g2_23.8-in_touch_all-in-one_business_firmwareelitebook_x360_830_g8_firmwareeliteone_1000_g1_34-in_curved_all-in-one_business_firmwarezhan_66_pro_a_14_g3_firmwareprobook_445_g8_firmwarezhan_66_pro_14_g4elite_dragonfly_g3zhan_66_pro_g3_22_all-in-oneeliteone_800_g3_23.8-inch_touch_gpu_all-in-one_firmwareprobook_455_g5_firmwareprodesk_480_g5_microtower_firmwareengage_one_pro_aio_systemelitebook_830_g7elitebook_640_g9probook_455_g6_firmwareprodesk_600_g4_microtowerprodesk_405_g4_small_form_factormp9_g2_retail_system_firmwareelite_slicez2_mini_g4_workstationelitedesk_705_g4_workstation_firmwareprobook_440_g6_firmwareelitebook_x360_830_g6_firmwareelitebook_830_g6_firmwareelite_tower_680_g9elitedesk_800_65w_g4_desktop_mini_firmwarezhan_66_pro_g1_firmwareeliteone_800_g6_24_all-in-oneelite_x2_g4_firmwareeliteone_800_g4_23.8-inch_non-touch_all-in-one_firmwarezhan_66_pro_13_g2_firmwareelitebook_x360_830_g7_firmwareengage_go_10_mobile_system_firmwareelite_dragonfly_g3_firmwareelite_dragonfly_g2_firmwareprobook_x360_11_g7_eeelitebook_x360_1030_g3_firmwareelitebook_1030_g1elite_mini_800_g9_firmwareelitebook_645_g9zbook_firefly_16_g9_firmwareproone_400_g5_23.8-inch_all-in-one_business_firmwareelite_sff_600_g9elitedesk_705_g4_microtower_firmwarezhan_66_pro_15_g2_firmwarezhan_66_pro_14_g4_firmwarezbook_firefly_15_g7elitedesk_800_35w_g4_desktop_mini_firmwareproone_440_g6_24_all-in-onezbook_power_g9_firmwareelitebook_845_g8_firmwareprobook_640_g8elitebook_830_g9_firmwarezhan_66_pro_g1elitedesk_705_g4_microtowereliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_firmwarerp9_g1_retail_system_firmwareelitebook_840_g7elitebook_1050_g1elitedesk_800_g6_small_form_factor_firmwareengage_one_aio_system_firmwaredragonfly_folio_g3_2-in-1prodesk_400_g7_microtower_firmwareelitebook_850_g5zbook_power_g7elite_mini_600_g9_firmwareeliteone_1000_g1_23.8-in_touch_all-in-one_businesselitebook_630_g9elitebook_x360_1040_g6_firmwareelitebook_x360_1030_g4_firmwareprobook_x360_11_g3_ee_firmwarezhan_66_pro_14_g3_firmwareprodesk_400_g5_microtowerproone_600_g2_21.5-inch_touch_all-in-oneelite_folio_2-in-1_firmwareproone_600_g2_21.5-inch_touch_all-in-one_firmwarezhan_66_pro_a_14_g3elitedesk_800_35w_g3_desktop_mini_firmwarezbook_power_g8probook_440_g8_firmwareelitedesk_880_g5_tower_firmwareprodesk_600_g2_microtowerzbook_15_g6_firmwareelite_sff_800_g9elitedesk_880_g6_tower_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_businessprodesk_600_g4_desktop_minizbook_fury_16_g9proone_400_g3_20-inch_non-touch_all-in-onezbook_create_g7_firmwareproone_440_g4_23.8-inch_non-touch_all-in-one_businessprobook_fortis_g10_firmwareelitebook_840_g5mt46_mobile_thin_clientprobook_440_g5proone_440_23.8_inch_g9_all-in-oneprodesk_600_g2_microtower_firmwareeliteone_800_g6_27_all-in-oneproone_600_g5_21.5-in_all-in-one_businesszhan_66_pro_a_14_g4_firmwarezhan_66_pro_g3_24_all-in-one_firmwareelitebook_1050_g1_firmwareelitebook_755_g5_firmwareelitedesk_800_65w_g2_desktop_mini_firmwaredragonfly_folio_g3_2-in-1_firmwareprobook_640_g4probook_455_g9_firmwareproone_600_g3_21.5-inch_non-touch_all-in-oneprobook_445r_g6_firmwareelitedesk_800_95w_g4_desktop_mini_firmwareprodesk_400_g5_small_form_factor_firmwareprodesk_600_g3_small_form_factor_firmwareprodesk_600_g6_desktop_mini_firmwareprodesk_600_g6_firmwarezhan_66_pro_13_g2elite_dragonflyprobook_440_g5_firmwareprodesk_400_g6_small_form_factor_firmwareprodesk_600_g6_small_form_factorelite_dragonfly_maxeliteone_800_g3_23.8-inch_non-touch_all-in-one_firmwareproone_400_g3_20-inch_non-touch_all-in-one_firmwareelitedesk_800_g6_desktop_minizbook_14u_g6_firmwareprobook_445r_g6mt45_mobile_thin_clientprodesk_400_g6_small_form_factorzbook_15_g6eliteone_800_g8_27_all-in-onez2_small_form_factor_g4_workstation_firmwareelitebook_835_g7_firmwareelitebook_745_g5_firmwareelitebook_850_g6_firmwareelitebook_1040_g3probook_430_g8_firmwareprodesk_405_g6_small_form_factor_firmwareelitedesk_800_g5_towerprobook_fortis_g9_firmwareeliteone_800_g4_23.8-inch_touch_all-in-oneprodesk_405_g4_desktop_miniprobook_470_g5z1_g9_tower_firmwareelite_x2_1012_g1zbook_firefly_16_g9elitebook_840_g8probook_640_g4_firmwareelitebook_846_g5z2_small_form_factor_g8_workstation_firmwareprobook_455r_g6_firmwareproone_600_g4_21.5-inch_touch_all-in-one_business_firmwareelite_x360_1040_g9_2-in-1_firmwareelitedesk_800_g2_small_form_factorelitedesk_800_g6_towerengage_go_mobile_systemeliteone_1000_g2_34-in_curved_all-in-one_business_firmwarezbook_17_g5_firmwareproone_440_23.8_inch_g9_all-in-one_firmwareelitedesk_800_65w_g4_desktop_minielitebook_830_g5prodesk_480_g7_firmwareelitebook_640_g9_firmwareelitebook_x360_1040_g6elitebook_840_g6_firmwarezhan_66_pro_15_g2prodesk_400_g4_small_form_factormt44_mobile_thin_client_firmwareelitebook_735_g6_firmwareelitedesk_805_g6_desktop_minizbook_firefly_14_g7_firmwarez1_entry_tower_g6_workstationelitebook_745_g5probook_440_g9eliteone_800_g2_23-inch_touch_all-in-one_firmwareelitedesk_800_g4_workstationpro_x360_fortis_g9_firmwareelitebook_855_g8elitedesk_705_g4_desktop_mini_firmwareelitebook_1030_g1_firmwareelitedesk_805_g8_desktop_mini_firmwareelitedesk_800_g4_workstation_firmwareelitebook_745_g6_firmwareelite_sff_800_g9_firmwareelitedesk_800_g5_small_form_factor_firmwareelitedesk_880_g5_towerelitedesk_800_g4_small_form_factor_firmwareeliteone_800_g8_24_all-in-one_firmwareeliteone_800_g6_24_all-in-one_firmwareelitebook_836_g6_firmwareelitebook_x360_1030_g7probook_x360_11_g5_eeprobook_440_g9_firmwareelitebook_x360_1040_g7_firmwareprobook_x360_440_g1mp9_g2_retail_systemelitedesk_880_g4_towereliteone_800_g4_23.8-inch_non-touch_all-in-oneelitedesk_880_g8_tower_firmwareelite_tower_800_g9elitebook_x360_1040_g5prodesk_400_g3_desktop_mini_firmwareelitedesk_800_g3_tower_firmwareeliteone_800_g3_23.8-inch_non-touch_gpu_all-in-oneeliteone_840_23.8_inch_g9_all-in-one_firmwarezbook_fury_17_g8_firmwareelitebook_850_g8elitebook_835_g9elite_sff_600_g9_firmwareprodesk_680_g4_microtower_firmwareelitedesk_705_g4_desktop_minielitebook_x360_1030_g4eliteone_800_g6_27_all-in-one_firmwareprodesk_400_g3_desktop_minirp9_g1_retail_systemprodesk_680_g2_microtower_firmwareprobook_x360_440_g1_firmwareprodesk_680_g4_microtowerengage_one_aio_systemzbook_15_g5_firmwareeliteone_800_g2_23-inch_non-touch_all-in-one_firmwarez1_entry_tower_g6_workstation_firmwareprobook_455_g8_firmwareprobook_x360_435_g8probook_640_g7_firmwareelitedesk_805_g6_desktop_mini_firmwareelitebook_840_g6eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_firmwareengage_flex_mini_retail_system_firmwareelitedesk_880_g3_tower_firmwareprobook_455_g6elitebook_850_g8_firmwareelite_x2_g8probook_x360_11_g4_eezbook_studio_g9_firmwareprobook_450_g8elitedesk_800_g3_towereliteone_800_g8_24_all-in-oneelitedesk_705_g5_small_form_factor_firmwarezbook_studio_g8_firmwareprodesk_600_g3_small_form_factorprodesk_480_g7prodesk_600_g5_microtowerelitebook_840_aero_g8_firmwareprodesk_680_g6elite_x2_1012_g2proone_400_g4_23.8-inch_non-touch_all-in-one_business_firmwareprobook_450_g9_firmwareeliteone_1000_g1_34-in_curved_all-in-one_businessprobook_445_g9_firmwareelitebook_840_g9prodesk_600_g5_desktop_miniprodesk_600_g2_small_form_factor_firmwareelitedesk_800_g8_small_form_factorprodesk_400_g7_small_form_factorzbook_studio_x360_g5zbook_15u_g6zbook_studio_x360_g5_firmwareproone_400_g6_24_all-in-oneprodesk_600_g5_small_form_factor_firmwareengage_go_10_mobile_systemprodesk_480_g4_microtowerelitedesk_800_35w_g3_desktop_minizbook_firefly_15_g8eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_firmwareproone_400_g2_20-inch_non-touch_all-in-one_firmwareelite_dragonfly_max_firmwarepro_x360_fortis_g10_firmwareprobook_x360_435_g8_firmwarezbook_studio_g7_firmwarezbook_firefly_15_g7_firmwareeliteone_800_g4_23.8-in_all-in-one_business_firmwareengage_one_pro_aio_system_firmwareprodesk_400_g7_small_form_factor_firmwarezbook_15u_g5elitebook_855_g8_firmwareproone_400_g5_20-inch_all-in-one_business_firmwareeliteone_800_g5_23.8-in_all-in-oneelite_x2_1013_g3_firmwareprobook_x360_435_g7elitedesk_705_g5_desktop_minielitebook_830_g7_firmwareengage_go_mobile_system_firmwarepro_x360_fortis_g9elitebook_850_g6probook_450_g7prodesk_680_g6_firmwareproone_440_g5_23.8-in_all-in-one_business_firmwareproone_600_g6_22_all-in-onezhan_66_pro_a_14_g5_firmwareprobook_450_g7_firmwareeliteone_800_g2_23-inch_non-touch_all-in-onepro_mini_400_g9zbook_fury_15_g8_firmwareelitedesk_800_g8_towerelite_tower_680_g9_firmwareprobook_650_g4zbook_fury_16_g9_firmwareelitedesk_705_g5_small_form_factorprobook_650_g5z2_tower_g4_workstation_firmwareeliteone_1000_g1_23.8-in_all-in-one_business_firmwareelitedesk_800_g3_small_form_factorelitedesk_805_g6_small_form_factor_firmwareprodesk_405_g8_desktop_mini_firmwarezbook_create_g7zhan_66_pro_14_g2_firmwareprodesk_405_g8_small_form_factoreliteone_1000_g2_23.8-in_touch_all-in-one_businessprodesk_405_g8_desktop_minielitebook_745_g6elitebook_650_g9_firmwareprobook_430_g6eliteone_800_g5_23.8-inch_all-in-one_firmwareprodesk_480_g5_microtowerengage_flex_pro_retail_system_firmwareelitebook_1040_g9elitebook_x360_1030_g3zhan_66_pro_g5_firmwareprodesk_600_g5_microtower_firmwarezhan_66_pro_g3_22_all-in-one_firmwareprodesk_480_g4_microtower_firmwareprodesk_600_g6zhan_x_13_g2_firmwareelitedesk_880_g3_towerprodesk_600_g6_microtowerpro_mini_400_g9_firmwareprobook_455r_g6probook_430_g7elitebook_650_g9prodesk_405_g8_small_form_factor_firmwareprobook_450_g8_firmwarepro_sff_400_g9_firmwareelitebook_836_g5elitedesk_880_g4_tower_firmwareproone_600_g2_21.5-inch_non-touch_all-in-one_firmwareproone_400_g5_20-inch_all-in-one_businesselitebook_855_g7elitedesk_800_35w_g2_desktop_mini_firmwareprobook_x360_11_g7_ee_firmwareproone_400_g2_20-inch_non-touch_all-in-oneprodesk_400_g6_desktop_minielitedesk_800_g6_tower_firmwareelitedesk_880_g6_towerprobook_650_g7probook_455_g7_firmwareprodesk_405_g6_small_form_factorelite_dragonfly_firmwareproone_480_g3_20-inch_non-touch_all-in_oneelitebook_840_g8_firmwarepro_tower_480_g9_firmwareelitebook_850_g7zbook_firefly_14_g8elitebook_x360_1040_g5_firmwareprobook_430_g5probook_430_g7_firmwarezbook_power_g7_firmwareelitedesk_705_g5_desktop_mini_firmwareprobook_x360_11_g5_ee_firmwareprodesk_600_g3_microtower_firmwarezbook_firefly_14_g8_firmwareeliteone_800_g5_23.8-in_all-in-one_firmwareelite_slice_g2elitebook_845_g7elitebook_850_g7_firmwareelitebook_655_g9elitebook_1040_g4_firmwareelitebook_840_aero_g8probook_450_g5_firmwareelitedesk_800_35w_g4_desktop_miniprodesk_400_g4_small_form_factor_firmwareelite_x2_g8_firmwareelitedesk_800_g3_small_form_factor_firmwareeliteone_800_g8_27_all-in-one_firmwareproone_480_g3_20-inch_non-touch_all-in_one_firmwarezbook_14u_g5elitebook_x360_1030_g8_firmwarezbook_firefly_14_g9eliteone_1000_g1_23.8-in_touch_all-in-one_business_firmwaremp9_g4_retail_system_firmwareelitebook_840r_g4probook_645_g4elitedesk_800_g5_small_form_factorelite_slice_firmwareelitedesk_705_g4_workstationelitedesk_805_g8_desktop_miniz1_g8_tower_firmwareengage_flex_mini_retail_systemeliteone_800_g4_23.8-inch_touch_all-in-one_firmwarezbook_studio_g8elitebook_845_g9_firmwareprobook_635_aero_g8probook_440_g7_firmwareprodesk_600_g3_desktop_mini_firmwarezbook_15u_g5_firmwareproone_600_g6_22_all-in-one_firmwareelitebook_655_g9_firmwareelitedesk_805_g8_small_form_factor_firmwareengage_flex_pro_retail_systemelitebook_830_g5_firmwareelitebook_840r_g4_firmwarezhan_66_pro_g5eliteone_800_g2_23-inch_touch_all-in-onezbook_firefly_14_g9_firmwareproone_600_g4_21.5-inch_touch_all-in-one_businessprodesk_600_g4_desktop_mini_firmwareprobook_fortis_g9HP PC BIOS
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-0115
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.12%
||
7 Day CHG~0.00%
Published-10 Jun, 2020 | 17:11
Updated-04 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In verifyIntentFiltersIfNeeded of PackageManagerService.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-150038428

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-39789
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.70%
||
7 Day CHG~0.00%
Published-30 Mar, 2022 | 16:02
Updated-04 Aug, 2024 | 02:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Telecom, there is a possible leak of TTY mode change due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-203880906

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-29871
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.83%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel(R) CSME software installer before version 2239.3.7.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8153xeon_platinum_8276latom_x6212receleron_j1750core_i7-8705gxeon_platinum_9222core_i7-8665uz270xeon_w-3245mxeon_gold_6230tcore_i3-8300tpentium_j2850xeon_gold_6146core_i7-8706gcore_i7-1068ng7xeon_gold_6126txeon_w-3225core_i5-1035g7core_i7-10850hxeon_gold_5115xeon_platinum_8170xeon_gold_6136hm570core_i5-8400hceleron_j1850core_i7-8700celeron_n6210core_i5-10400fcore_i5-8400wm490xeon_gold_6138core_i3-10300core_i7-10700txeon_gold_6246core_i7-8086kceleron_4305ucore_i5-10210uceleron_n2815xeon_platinum_8164core_i5-8257ucore_i7-8700kcore_i5-10200hxeon_gold_6234xeon_gold_6238rq150converged_security_management_engine_firmwarecore_i5-1035g4celeron_n2940core_i3-8145ucore_i5-10400hceleron_4205uceleron_n5105h670xeon_gold_5215core_i3-10100yceleron_j3455core_i5-10400tcore_i3-8109uxeon_gold_6262vxeon_platinum_8168core_i5-10310ucore_i5-10505c246core_i5-1030g7xeon_gold_5218celeron_n4500cm236hm370pentium_n6415xeon_silver_4109tcore_i3-1000g1core_i7-10510yxeon_gold_5215lxeon_silver_4215rceleron_j3160core_i3-10110uxeon_gold_6138fxeon_gold_5122celeron_n3150celeron_n4100xeon_silver_4210tceleron_n3060xeon_gold_6212ucore_i5-10400hm470core_i5-8400bxeon_silver_4114xeon_gold_6248rcore_i5-10500tecore_i3-10105fcore_i3-8100hhm670xeon_gold_6258rxeon_bronze_3104h110core_i5-l16g7core_i5-10300hceleron_n4120xeon_gold_6240xeon_gold_6240lxeon_gold_6238lxeon_gold_6250core_i5-8350ucore_i9-10980hkw580q270xeon_platinum_8156c236core_i5-8600core_i5-8500tcore_i7-10510uxeon_w-3265mceleron_n2840atom_x6214receleron_j4125core_i3-10100ecore_i3-8100core_i7-1060g7celeron_n2910core_i9-10900celeron_n2930h410h570pentium_n3510xeon_gold_6126fcore_i3-10100txeon_gold_5218tcore_i9-8950hkxeon_gold_6150core_i9-10900ecore_i9-10850kxeon_gold_5220rxeon_gold_6140qm480pentium_n3700core_i9-10900kh270core_i5-8600kxeon_platinum_8160fq470core_i9-10900fcore_i5-8400tpentium_n3520core_i7-8750hxeon_gold_6250lcore_i7-10700core_i5-8365uqm580celeron_j3060b150h510xeon_gold_6210uc252celeron_n3160core_i3-10100term590exeon_gold_6126core_i3-10105tcore_i9-10885hcore_i7-10700fcore_i3-10325pentium_n3540z690core_i7-10750hxeon_silver_4216xeon_gold_6230xeon_platinum_8253q470ecore_i3-8300core_i3-1000g4core_i7-10875hwm690xeon_silver_4116tatom_x6427feq370core_i7-8809gcore_i3-8145ueceleron_j4105xeon_gold_6142fcore_i3-l13g4core_i7-8700bcore_i7-8709gcore_i3-10100b560xeon_gold_6238celeron_j1800xeon_gold_6130celeron_j1900z590core_i3-8100tq670xeon_silver_4208celeron_n4505xeon_platinum_8260h170core_i5-10210yh310wm590core_i7-8557ub660core_i5-10500eatom_x5-e3930xeon_gold_5220sxeon_w-3275mceleron_j3355core_i7-8700tatom_x7-e3950xeon_platinum_9242core_i5-8300hxeon_platinum_9282core_i5-10600tcore_i3-10110yxeon_platinum_8280lcore_i5-10600kfxeon_silver_4110core_i7-8650uxeon_bronze_3204core_i7-10700eceleron_j3355exeon_gold_5119txeon_silver_4108xeon_gold_6130tatom_x6414rec242xeon_silver_4210xeon_gold_6246rz370celeron_n3700core_i7-10870hxeon_gold_5217w480core_i5-1035g1core_i5-1038ng7h420exeon_gold_6230nhm170xeon_w-3265xeon_gold_5218nz170xeon_bronze_3106xeon_gold_6138tcm246xeon_w-3245x299xeon_gold_5120celeron_n3350core_i5-8500bcore_i7-10700kceleron_n3050core_i5-8269uceleron_n5095pentium_silver_j5005core_i5-1030g4celeron_n3520core_i7-10700teceleron_n3000xeon_gold_5220xeon_platinum_8160tceleron_n2807core_i5-10500xeon_silver_4214ratom_x6425exeon_gold_6254pentium_j3710xeon_silver_4114tpentium_j2900xeon_gold_6240yq570xeon_gold_6154core_i7-10710uq670ecore_i7-10700kfh370xeon_gold_6208ucore_i5-8279uxeon_platinum_8268w480epentium_n3530core_i7-8565uxeon_gold_5222xeon_w-3275core_i5-8250uatom_x6425receleron_n2820core_i3-10305b365xeon_silver_4209txeon_silver_4116hm175xeon_gold_6252ncore_i5-8259uxeon_platinum_9221xeon_gold_6244xeon_platinum_8160celeron_n2805celeron_n2806atom_x6416rexeon_gold_6248core_i5-10600kqm170atom_x5-e3940r680eceleron_4305uecore_i3-8140uxeon_platinum_8280core_m3-8100ycore_i9-10900kfcore_i3-10105pentium_n4200q170xeon_gold_6148fb460xeon_gold_6132celeron_n3350exeon_platinum_8256xeon_gold_6152xeon_platinum_8158hm570ecore_i7-8550ucore_i5-10310yceleron_n3010atom_x6211exeon_gold_6222vpentium_j6426core_i5-10500hxeon_platinum_8176xeon_gold_6242core_i5-8260uceleron_n2808celeron_j4025pentium_j4205c422qm175core_i7-10810ub250xeon_gold_6142xeon_platinum_8260yxeon_platinum_8270celeron_j6413c256xeon_gold_6242rxeon_gold_6128xeon_silver_4215core_i7-8850hxeon_gold_5118xeon_gold_6130fcore_i7-10610ucore_i3-10100fw680core_i7-8500yceleron_n2920atom_x6413eb360core_i5-10600xeon_silver_4214xeon_platinum_8276xeon_gold_6238txeon_silver_4210rxeon_silver_4214ycore_i7\+8700core_i5-8210yceleron_n6211xeon_gold_5218bxeon_gold_6138pcore_i5-8365uecore_i7-8665uexeon_platinum_8176fceleron_n4000celeron_n2830celeron_j3455exeon_gold_6240rpentium_n4200ecore_i3-10320core_i9-10900tcore_i5-8200ycore_i3-10300tcore_i5-8310yceleron_n3450qm580eceleron_n5100pentium_n3710celeron_n4020core_i5-8500xeon_gold_6209uh610xeon_silver_4112qm370celeron_j6412xeon_w-3223xeon_gold_6226xeon_gold_6256celeron_n2810xeon_gold_5120txeon_gold_6230rxeon_w-3175xcore_i7-8569uxeon_gold_6252atom_x6200fexeon_gold_6134q250z490core_i5-8265ucore_i5-10500txeon_w-3235h610epentium_gold_5405uxeon_gold_5218rxeon_gold_6226rcore_i3-1005g1celeron_j4005xeon_bronze_3206rcore_i3-8100bcore_i3-10305tcore_i3-8350kxeon_gold_6148c232core_i5-8600tcore_i5-8305gxeon_gold_6144pentium_silver_j5040core_i7-1065g7xeon_platinum_8260lcm238core_i7-8559ucore_i9-10900texeon_platinum_8180z390c420core_i3-8130uh470xeon_gold_5220tIntel(R) CSME software installerintel_csme_software_installer
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-3560
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-6.08% / 90.39%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 00:00
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-06-02||Apply updates per vendor instructions.

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Action-Not Available
Vendor-polkit_projectn/aRed Hat, Inc.Canonical Ltd.Debian GNU/Linux
Product-virtualizationvirtualization_hostdebian_linuxpolkitubuntu_linuxenterprise_linuxopenshift_container_platformpolkitPolkit
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2021-35526
Matching Score-4
Assigner-Hitachi Energy
ShareView Details
Matching Score-4
Assigner-Hitachi Energy
CVSS Score-6.3||MEDIUM
EPSS-0.01% / 0.58%
||
7 Day CHG~0.00%
Published-08 Sep, 2021 | 15:10
Updated-16 Sep, 2024 | 19:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Storage of Sensitive Information Vulnerability in Hitachi ABB Power Grids System Data Manager – SDM600 Product

Backup file without encryption vulnerability is found in Hitachi ABB Power Grids System Data Manager – SDM600 allows attacker to gain access to sensitive information. This issue affects: Hitachi ABB Power Grids System Data Manager – SDM600 1.2 versions prior to FP2 HF6 (Build Nr. 1.2.14002.257).

Action-Not Available
Vendor-Hitachi Energy Ltd.Hitachi, Ltd.
Product-sdm600_firmwaresdm600System Data Manager – SDM600
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-31165
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.33% / 55.27%
||
7 Day CHG~0.00%
Published-11 May, 2021 | 19:11
Updated-03 Aug, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Container Manager Service Elevation of Privilege Vulnerability

Windows Container Manager Service Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_10Windows Server version 2004Windows 10 Version 2004Windows Server version 20H2Windows 10 Version 20H2
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-28826
Matching Score-4
Assigner-TIBCO Software Inc.
ShareView Details
Matching Score-4
Assigner-TIBCO Software Inc.
CVSS Score-8.8||HIGH
EPSS-0.03% / 6.61%
||
7 Day CHG~0.00%
Published-14 Apr, 2021 | 16:20
Updated-16 Sep, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TIBCO Messaging - Eclipse Mosquitto Distribution - Bridge Windows Platform Installation vulnerability

The Windows Installation component of TIBCO Software Inc.'s TIBCO Messaging - Eclipse Mosquitto Distribution - Bridge - Community Edition and TIBCO Messaging - Eclipse Mosquitto Distribution - Bridge - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO Messaging - Eclipse Mosquitto Distribution - Bridge - Community Edition: versions 1.3.0 and below and TIBCO Messaging - Eclipse Mosquitto Distribution - Bridge - Enterprise Edition: versions 1.3.0 and below.

Action-Not Available
Vendor-Microsoft CorporationTIBCO (Cloud Software Group, Inc.)
Product-windowsmessaging_-_eclipse_mosquitto_distribution_-_bridgeTIBCO Messaging - Eclipse Mosquitto Distribution - Bridge - Community EditionTIBCO Messaging - Eclipse Mosquitto Distribution - Bridge - Enterprise Edition
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-28819
Matching Score-4
Assigner-TIBCO Software Inc.
ShareView Details
Matching Score-4
Assigner-TIBCO Software Inc.
CVSS Score-8.8||HIGH
EPSS-0.03% / 8.03%
||
7 Day CHG~0.00%
Published-23 Mar, 2021 | 20:15
Updated-16 Sep, 2024 | 22:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TIBCO FTL Windows Platform Installation vulnerability

The Windows Installation component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.5.0 and below, TIBCO FTL - Developer Edition: versions 6.5.0 and below, and TIBCO FTL - Enterprise Edition: versions 6.5.0 and below.

Action-Not Available
Vendor-Microsoft CorporationTIBCO (Cloud Software Group, Inc.)
Product-ftlwindowsTIBCO FTL - Community EditionTIBCO FTL - Enterprise EditionTIBCO FTL - Developer Edition
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-28821
Matching Score-4
Assigner-TIBCO Software Inc.
ShareView Details
Matching Score-4
Assigner-TIBCO Software Inc.
CVSS Score-8.8||HIGH
EPSS-0.13% / 32.71%
||
7 Day CHG~0.00%
Published-23 Mar, 2021 | 20:15
Updated-16 Sep, 2024 | 22:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TIBCO Enterprise Message Service Windows Platform Installation vulnerability

The Windows Installation component of TIBCO Software Inc.'s TIBCO Enterprise Message Service, TIBCO Enterprise Message Service - Community Edition, and TIBCO Enterprise Message Service - Developer Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO Enterprise Message Service: versions 8.5.1 and below, TIBCO Enterprise Message Service - Community Edition: versions 8.5.1 and below, and TIBCO Enterprise Message Service - Developer Edition: versions 8.5.1 and below.

Action-Not Available
Vendor-Microsoft CorporationTIBCO (Cloud Software Group, Inc.)
Product-enterprise_message_servicewindowsTIBCO Enterprise Message ServiceTIBCO Enterprise Message Service - Developer EditionTIBCO Enterprise Message Service - Community Edition
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-3493
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-8.8||HIGH
EPSS-73.10% / 98.73%
||
7 Day CHG~0.00%
Published-17 Apr, 2021 | 04:20
Updated-30 Jul, 2025 | 01:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-11-10||Apply updates per vendor instructions.

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

Action-Not Available
Vendor-Linux Kernel Organization, IncUbuntuCanonical Ltd.
Product-ubuntu_linuxlinux kernelKernel
CWE ID-CWE-270
Privilege Context Switching Error
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-35112
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.08% / 25.49%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 10:11
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A user with user level permission can access graphics protected region due to improper access control in register configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830sa6150p_firmwaresa8145p_firmwareqcs610qcs2290_firmwareqca8337wcd9360_firmwarecsra6620qcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqcs2290qca6595au_firmwareqca6390_firmwarewcd9370csra6620_firmwareqcs605_firmwarecsra6640_firmwareqcs6125_firmwareqca6426wcn3990_firmwareqrb5165n_firmwareqca9377wcn3998wcd9385_firmwareqam8295psdxr2_5g_firmwarewcn3950qsw8573_firmwaresd_8_gen1_5g_firmwaresm6375_firmwarewcn3660bsd662sd460_firmwareqam8295p_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwareqca6595ausdx12_firmwarewcd9375_firmwarewcn3998_firmwaremsm8909wsm7250p_firmwareapq8009w_firmwarewcd9360qca6436_firmwarewcn3610_firmwareqrb5165nsd778gsa6155p_firmwarewcn3999sa515m_firmwareqcs6490qrb5165_firmwareqrb5165m_firmwaresd429sdxr2_5gqcs6125sd662_firmwareqcs405wcn3988_firmwaresa6145p_firmwaresd205sd429_firmwaresd778g_firmwarewcd9340sa8195pwsa8810_firmwarequalcomm215_firmwaresd765gsw5100sd765_firmwareqca6436wcn6851wcd9335sa6155pqcs603_firmwareqca6174a_firmwareqcs4290_firmwarewcd9385wcd9341qca6696_firmwareqcs6490_firmwaresd870_firmwarear8035qca6390wcd9375aqt1000sa8150pwcn3910_firmwarewsa8830_firmwaresda429wsd210sd855_firmwaresd865_5g_firmwarewcn3620_firmwareqcm6490sd888_5g_firmwarewcn3988wcn3620wcn6850_firmwarewsa8815_firmwaresa8195p_firmwarewsa8835_firmwaresm8475sa8295p_firmwarewcn6750_firmwarewcn3610qcm6125_firmwareqcm2290_firmwaresm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwarewcn3990sdm429wsd780gsw5100psd865_5gsdx24sdx55m_firmwarewcn6856_firmwaresd888qet4101_firmwaremsm8909w_firmwarewsa8835sdm429w_firmwarewcd9380sd888_5gwcn3999_firmwarequalcomm215qcs410qca6574awcn6855_firmwareqca6174asm7325psdx24_firmwarewcd9335_firmwarewcn3980wcn6750qsw8573sa515mqcs605wcd9340_firmwaresd855wsa8815sm7325p_firmwarewcn6850wcn3910sd765qca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd768g_firmwareqrb5165mwcn3980_firmwaresm7315sd460qca6391sdx55msa8295paqt1000_firmwarewcn6740_firmwarear8031_firmwareqcm4290qcm6490_firmwareqrb5165sd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwaresd205_firmwareapq8009wwcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855wsa8810sw5100p_firmwaresd210_firmwareqcs610_firmwaremdm9150wcn6856sa6145psd768gar8031qcs405_firmwaresa8145pwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresa6150psd888_firmwaresdx55sa8155pcsra6640qet4101sm7250psdx12sw5100_firmwareqcs410_firmwarear8035_firmwareqcm2290Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-22042
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.30% / 52.72%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 16:37
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware ESXi contains an unauthorized access vulnerability due to VMX having access to settingsd authorization tickets. A malicious actor with privileges within the VMX process only, may be able to access settingsd service running as a high privileged user.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-esxicloud_foundationVMware ESXi and VMware Cloud Foundation
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-27836
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.4||HIGH
EPSS-0.01% / 1.12%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:37
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control and path traversal vulnerability in Storage Manager and Storage Manager Service prior to SMR Apr-2022 Release 1 allow local attackers to access arbitrary system files without a proper permission. The patch adds proper validation logic to prevent arbitrary files access.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-8724
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.51%
||
7 Day CHG~0.00%
Published-11 Jan, 2021 | 15:34
Updated-05 Aug, 2024 | 07:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe.

Action-Not Available
Vendor-k7computingn/a
Product-total_securityantivriusenterprise_securityultimate_securityn/a
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-0694
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.78%
||
7 Day CHG~0.00%
Published-12 Apr, 2022 | 16:11
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In setServiceForegroundInnerLocked of ActiveServices.java, there is a possible way for a background application to regain foreground permissions due to insufficient background restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-183147114

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-19520
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.23% / 83.85%
||
7 Day CHG~0.00%
Published-04 Dec, 2019 | 23:34
Updated-05 Aug, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-0649
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.78%
||
7 Day CHG~0.00%
Published-15 Dec, 2021 | 18:05
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In stopVpnProfile of Vpn.java, there is a possible VPN profile reset due to a permissions bypass. This could lead to local escalation of privilege CONTROL_ALWAYS_ON_VPN with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-191382886

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-0472
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.18%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 16:42
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In shouldLockKeyguard of LockTaskController.java, there is a possible way to exit App Pinning without a PIN due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-176801033

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-0571
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.62%
||
7 Day CHG~0.00%
Published-22 Jun, 2021 | 10:56
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ActivityTaskManagerService.startActivity() and AppTaskImpl.startActivity() of ActivityTaskManagerService.java and AppTaskImpl.java, there is possible access to restricted activities due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-137395936

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-0376
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.18%
||
7 Day CHG~0.00%
Published-10 Mar, 2021 | 15:57
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In checkUriPermission and related functions of MediaProvider.java, there is a possible way to access external files due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-115619667

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-42124
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 19.02%
||
7 Day CHG~0.00%
Published-03 May, 2024 | 02:13
Updated-13 Aug, 2025 | 12:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Avast Premium Security Sandbox Protection Incorrect Authorization Privilege Escalation Vulnerability

Avast Premium Security Sandbox Protection Incorrect Authorization Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of the sandbox feature. The issue results from incorrect authorization. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code outside the sandbox at medium integrity. . Was ZDI-CAN-20178.

Action-Not Available
Vendor-avastAvastavast
Product-premium_securityPremium Securitypremium_security
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-6018
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.04%
||
7 Day CHG+0.01%
Published-23 Jul, 2025 | 14:58
Updated-23 Jul, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pam-config: lpe from unprivileged to allow_active in pam

A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-5343
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.3||HIGH
EPSS-0.02% / 3.44%
||
7 Day CHG~0.00%
Published-04 May, 2020 | 18:50
Updated-17 Sep, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Client platforms restored using a Dell OS recovery image downloaded before December 20, 2019, may contain an insecure inherited permissions vulnerability. A local authenticated malicious user with low privileges could exploit this vulnerability to gain unauthorized access on the root folder.

Action-Not Available
Vendor-Dell Inc.
Product-os_recovery_image_for_microsoft_windows_10CPG SW
CWE ID-CWE-277
Insecure Inherited Permissions
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-5199
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.3||HIGH
EPSS-0.01% / 1.20%
||
7 Day CHG~0.00%
Published-11 Jul, 2025 | 23:21
Updated-26 Aug, 2025 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LPE on Multipass for macOS

In Canonical Multipass up to and including version 1.15.1 on macOS, incorrect default permissions allow a local attacker to escalate privileges by modifying files executed with administrative privileges by a Launch Daemon during system startup.

Action-Not Available
Vendor-Apple Inc.Canonical Ltd.
Product-multipassmacosMultipass
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-3600
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 8.78%
||
7 Day CHG~0.00%
Published-06 Nov, 2020 | 18:17
Updated-13 Nov, 2024 | 17:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN Software Privilege Escalation Vulnerability

A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient security controls on the CLI. An attacker could exploit this vulnerability by using an affected CLI utility that is running on an affected system. A successful exploit could allow the attacker to gain root privileges.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wanCisco SD-WAN Solution
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-40117
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.23%
||
7 Day CHG~0.00%
Published-27 Oct, 2023 | 20:22
Updated-29 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In resetSettingsLocked of SettingsProvider.java, there is a possible lockscreen bypass due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-3404
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.33%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 18:02
Updated-13 Nov, 2024 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Consent Token Bypass Vulnerability

A vulnerability in the persistent Telnet/Secure Shell (SSH) CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the persistent Telnet/SSH CLI on an affected device and requesting shell access. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS with root privileges.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-catalyst_c9200l-48pxg-4x1100-6g_integrated_services_routercatalyst_c9407rcatalyst_c9300-48pws-c3650-24td4331_integrated_services_routercatalyst_c9500-16x4461_integrated_services_routercatalyst_c9200-24pasr_1000-xws-c3850catalyst_c9200l-48pxg-2ycatalyst_c9200l-48t-4g111x_integrated_services_routercatalyst_9800-lasr_1013catalyst_c9300l-48p-4xcatalyst_c9500-24y4ccatalyst_c9200l-24t-4gws-c3650-24psasr1001-hxcatalyst_9800-clws-c3650-48tqcatalyst_c9200l-48p-4gws-c3650-12x48uzws-c3850-48xs1160_integrated_services_routercatalyst_c9300l-24t-4g1100-lte_integrated_services_routercatalyst_c9200l-24pxg-2yws-c3850-24ucatalyst_9800-801109_integrated_services_routercatalyst_c9200l-24p-4xcatalyst_c9300l-24p-4xcatalyst_c9300l-48p-4gws-c3650-48pd1100-4g_integrated_services_router1111x_integrated_services_routercatalyst_c9300-48uxmcatalyst_9800-401101-4p_integrated_services_router1100-4p_integrated_services_routercatalyst_c9500-40xasr_1006ws-c3850-24xsasr1002-hx-wscatalyst_c9200-24tws-c3650-24pdm1101_integrated_services_router1100-4gltegb_integrated_services_router4451_integrated_services_routerws-c3650-48fqmws-c3850-48tcatalyst_c9200l-48p-4xcatalyst_c9410rcatalyst_c9300-24pasr1001-hx-rfws-c3650-24pdws-c3650-48fsws-c3850-48pws-c3850-24pcatalyst_c9300-48u1100-4gltena_integrated_services_router1100_integrated_services_routerws-c3650-8x24uqcatalyst_9800-l-cws-c3650-48tscatalyst_c9300-48tcatalyst_c9500-12qcatalyst_c9500-24qws-c3650-12x48urcatalyst_c9200-48tcatalyst_c9300-24sasr1002-x-rfws-c3650-12x48uqws-c3650-48tdasr_1001asr1002-hx4221_integrated_services_routercatalyst_c9404rws-c3850-12x48ucatalyst_c9300-24ucatalyst_c9200l-48t-4xws-c3650-48fdasr1002-x-wscatalyst_c9500-32casr_1002-xcatalyst_c9300l-24p-4gws-c3850-12scatalyst_c9500-32qcasr1002-hx-rfws-c3850-48ucatalyst_c9200l-24p-4gcatalyst_c9300-48sws-c3650-48fqws-c3850-48fws-c3850-24xucatalyst_c9300l-48t-4xws-c3650-48ps1109-2p_integrated_services_routerws-c3850-24tasr_1002catalyst_c9300l-24t-4xcatalyst_9800-l-fws-c3650-24tsasr_1004catalyst_c9200-48p1120_integrated_services_routercatalyst_c9300-48uncatalyst_c9200l-24t-4xasr1001-x-rfws-c3650-48pqcatalyst_c9300-24t4431_integrated_services_routercatalyst_c9200l-24pxg-4xasr1001-x-wscsr_1000vios_xecatalyst_c9300l-48t-4g1111x-8p_integrated_services_routercatalyst_c9500-48y4c1100-8p_integrated_services_routerws-c3850-24s1109-4p_integrated_services_routercatalyst_c9300-24uxasr_1001-xws-c3850-12xsCisco IOS XE Software
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-3473
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.11%
||
7 Day CHG~0.00%
Published-04 Sep, 2020 | 02:26
Updated-13 Nov, 2024 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software Authenticated User Privilege Escalation Vulnerability

A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local CLI shell user to elevate privileges and gain full administrative control of the device. The vulnerability is due to incorrect mapping of a command to task groups within the source code. An attacker could exploit this vulnerability by first authenticating to the local CLI shell on the device and using the CLI command to bypass the task group–based checks. A successful exploit could allow the attacker to elevate privileges and perform actions on the device without authorization checks.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-8201ncs_5502-sencs_5508ncs_5501ncs_4009ncs_560881288188202ios_xrv_9000ncs_5516ncs_5501-sencs_6000ncs_60088808ncs_540ncs_4016ios_xrncs_5502Cisco IOS XR Software
CWE ID-CWE-264
Not Available
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-28211
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.05%
||
7 Day CHG~0.00%
Published-19 Nov, 2020 | 21:03
Updated-04 Aug, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-863: Incorrect Authorization vulnerability exists in PLC Simulator on EcoStruxureª Control Expert (now Unity Pro) (all versions) that could cause bypass of authentication when overwriting memory using a debugger.

Action-Not Available
Vendor-n/a
Product-ecostruxure_control_expertPLC Simulator on EcoStruxureª Control Expert (now Unity Pro) (all versions)
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21225
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.27%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 00:00
Updated-03 Dec, 2024 | 19:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

there is a possible way to bypass the protected confirmation screen due to Failure to lock display power. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-270403821References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-24716
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.25%
||
7 Day CHG~0.00%
Published-27 Aug, 2020 | 18:03
Updated-04 Aug, 2024 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenZFS before 2.0.0-rc1, when used on FreeBSD, allows execute permissions for all directories.

Action-Not Available
Vendor-openzfsn/aFreeBSD Foundation
Product-openzfsfreebsdn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-0036
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.81%
||
7 Day CHG~0.00%
Published-10 Mar, 2020 | 19:56
Updated-04 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In hasPermissions of PermissionMonitor.java, there is a possible access to restricted permissions due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-144679405

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-0097
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.72%
||
7 Day CHG~0.00%
Published-14 May, 2020 | 20:09
Updated-04 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In various methods of PackageManagerService.java, there is a possible permission bypass due to a missing condition for system apps. This could lead to local escalation of privilege with User privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-145981139

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found