A vulnerability in Cisco Meraki Systems Manager (SM) Agent for Windows could allow an authenticated, local attacker to execute arbitrary code with elevated privileges.
This vulnerability is due to incorrect handling of directory search paths at runtime. A low-privileged attacker could exploit this vulnerability by placing both malicious configuration files and malicious DLL files on an affected system, which would read and execute the files when Cisco Meraki SM launches on startup. A successful exploit could allow the attacker to execute arbitrary code on the affected system with SYSTEM privileges.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-agent-dll-hj-Ptn7PtKe | Vendor Advisory |
Configurations
History
18 Sep 2024, 18:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Cisco
Cisco meraki Systems Manager |
|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-agent-dll-hj-Ptn7PtKe - Vendor Advisory | |
CPE | cpe:2.3:a:cisco:meraki_systems_manager:*:*:*:*:*:windows:*:* |
12 Sep 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-12 20:15
Updated : 2024-09-18 18:56
NVD link : CVE-2024-20430
Mitre link : CVE-2024-20430
CVE.ORG link : CVE-2024-20430
JSON object : View
Products Affected
cisco
- meraki_systems_manager
CWE
CWE-427
Uncontrolled Search Path Element