A privilege escalation vulnerability may enable a service account to elevate its privileges. The sudo rules configured for a local service account were excessively permissive, potentially allowing administrative access if a malicious actor could execute arbitrary commands as that account. It is important to note that no such vector has been identified in this instance.
History

Tue, 10 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Jun 2025 10:45:00 +0000

Type Values Removed Values Added
Description A privilege escalation vulnerability may enable a service account to elevate its privileges. The sudo rules configured for a local service account were excessively permissive, potentially allowing administrative access if a malicious actor could execute arbitrary commands as that account. It is important to note that no such vector has been identified in this instance.
Title Privilege escalation in Guardian/CMC before 24.6.0
Weaknesses CWE-250
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published: 2025-06-10T10:31:02.099Z

Updated: 2025-06-10T14:28:19.863Z

Reserved: 2024-12-31T11:12:59.363Z

Link: CVE-2024-13090

cve-icon Vulnrichment

Updated: 2025-06-10T14:28:09.811Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-10T11:15:52.477

Modified: 2025-06-12T16:06:39.330

Link: CVE-2024-13090

cve-icon Redhat

No data.