The terminal emulator of Apache Guacamole 1.5.5 and older does not properly validate console codes received from servers via text-based protocols like SSH. If a malicious user has access to a text-based connection, a specially-crafted sequence of console codes could allow arbitrary code to be executed with the privileges of the running guacd process. Users are recommended to upgrade to version 1.6.0, which fixes this issue.
History

Wed, 02 Jul 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 02 Jul 2025 11:30:00 +0000

Type Values Removed Values Added
Description The terminal emulator of Apache Guacamole 1.5.5 and older does not properly validate console codes received from servers via text-based protocols like SSH. If a malicious user has access to a text-based connection, a specially-crafted sequence of console codes could allow arbitrary code to be executed with the privileges of the running guacd process. Users are recommended to upgrade to version 1.6.0, which fixes this issue.
Title Apache Guacamole: Improper input validation of console codes
Weaknesses CWE-129
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-07-02T11:23:22.750Z

Updated: 2025-07-03T03:55:32.080Z

Reserved: 2024-05-10T07:46:23.307Z

Link: CVE-2024-35164

cve-icon Vulnrichment

Updated: 2025-07-02T13:07:00.302Z

cve-icon NVD

Status : Received

Published: 2025-07-02T12:15:27.770

Modified: 2025-07-02T12:15:27.770

Link: CVE-2024-35164

cve-icon Redhat

No data.