7.2
CVE-2018-6978
- EPSS 0.02%
- Veröffentlicht 18.12.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:11:31
- Quelle security@vmware.com
- Teams Watchlist Login
- Unerledigt Login
vRealize Operations (7.x before 7.0.0.11287810, 6.7.x before 6.7.0.11286837 and 6.6.x before 6.6.1.11286876) contains a local privilege escalation vulnerability due to improper permissions of support scripts. Admin user of the vROps application with shell access may exploit this issue to elevate the privileges to root on a vROps machine. Note: the admin user (non-sudoer) should not be confused with root of the vROps machine.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VMware ≫ Vrealize Operations Version >= 6.6.0 < 6.6.1.11286876
VMware ≫ Vrealize Operations Version >= 6.7.0 < 6.7.0.11286837
VMware ≫ Vrealize Operations Version >= 7.0.0 < 7.0.0.11287810
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.029 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.7 | 0.8 | 5.9 |
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
CWE-732 Incorrect Permission Assignment for Critical Resource
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.