Privilege Escalation Vulnerability in Quest KACE System Management Appliance 8.0.318

Privilege Escalation Vulnerability in Quest KACE System Management Appliance 8.0.318

CVE-2018-11134 · HIGH Severity

AV:N/AC:L/AU:S/C:C/I:C/A:C

In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A low-privilege user could abuse this feature by changing the password of the 'kace_support' account, which comes disabled by default but has full sudo privileges.

Learn more about our User Device Pen Test.