In HP ThinPro Linux 6.2, 6.2.1, 7.0 and 7.1, an attacker may be able to leverage the application filter bypass vulnerability to gain privileged access to create a file on the local file system whose presence puts the device in Administrative Mode, which will allow the attacker to executed commands with elevated privileges.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/156899/HP-ThinPro-6.x-7.x-Privilege-Escalation.html - | |
References | () http://seclists.org/fulldisclosure/2020/Mar/38 - | |
References | () https://support.hp.com/us-en/document/c06509350 - Vendor Advisory |
Information
Published : 2019-11-22 22:15
Updated : 2024-11-21 04:30
NVD link : CVE-2019-16287
Mitre link : CVE-2019-16287
CVE.ORG link : CVE-2019-16287
JSON object : View
Products Affected
hp
- thinpro
CWE