CVE-2024-47255

In 2N Access Commander versions 3.1.1.2 and prior, a local attacker can escalate their privileges in the system which could allow for arbitrary code execution with root permissions.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*

History

06 Nov 2024, 22:23

Type Values Removed Values Added
First Time 2n
2n access Commander
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*
References () https://www.2n.com/en-GB/about-2n/cybersecurity/ - () https://www.2n.com/en-GB/about-2n/cybersecurity/ - Product
CVSS v2 : unknown
v3 : 4.7
v2 : unknown
v3 : 7.8

05 Nov 2024, 16:04

Type Values Removed Values Added
Summary
  • (es) En las versiones 3.1.1.2 y anteriores de 2N Access Commander, un atacante local puede escalar sus privilegios en el sistema, lo que podría permitir la ejecución de código arbitrario con permisos de root.

05 Nov 2024, 10:20

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-05 10:20

Updated : 2024-11-06 22:23


NVD link : CVE-2024-47255

Mitre link : CVE-2024-47255

CVE.ORG link : CVE-2024-47255


JSON object : View

Products Affected

2n

  • access_commander
CWE
NVD-CWE-noinfo CWE-345

Insufficient Verification of Data Authenticity