CVE-2024-6913

Execution with unnecessary privileges in PerkinElmer ProcessPlus allows an attacker to spawn a remote shell on the windows system.This issue affects ProcessPlus: through 1.11.6507.0.
References
Link Resource
http://seclists.org/fulldisclosure/2024/Jul/13 Exploit Mailing List Third Party Advisory
https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:perkinelmer:processplus:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

11 Sep 2024, 16:58

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:perkinelmer:processplus:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References () http://seclists.org/fulldisclosure/2024/Jul/13 - () http://seclists.org/fulldisclosure/2024/Jul/13 - Exploit, Mailing List, Third Party Advisory
References () https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/ - () https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/ - Exploit, Third Party Advisory
First Time Perkinelmer processplus
Microsoft windows
Microsoft
Perkinelmer
CWE NVD-CWE-noinfo

24 Jul 2024, 12:55

Type Values Removed Values Added
Summary
  • (es) La ejecución con privilegios innecesarios en PerkinElmer ProcessPlus permite a un atacante generar un shell remoto en el sistema Windows. Este problema afecta a ProcessPlus: hasta 1.11.6507.0.

23 Jul 2024, 03:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/13 -

22 Jul 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-22 21:15

Updated : 2024-09-11 16:58


NVD link : CVE-2024-6913

Mitre link : CVE-2024-6913

CVE.ORG link : CVE-2024-6913


JSON object : View

Products Affected

perkinelmer

  • processplus

microsoft

  • windows
CWE
NVD-CWE-noinfo CWE-250

Execution with Unnecessary Privileges