Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-40872", "assignerOrgId": "b6533044-ea05-4482-8458-7bddeca0d079", "state": "PUBLISHED", "assignerShortName": "Absolute", "dateReserved": "2024-07-10T20:40:17.120Z", "datePublished": "2024-07-25T17:00:38.151Z", "dateUpdated": "2024-08-02T04:39:55.376Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "packageName": "Client and Server", "product": "Secure Access", "vendor": "Absolute Security", "versions": [{"lessThan": "13.07", "status": "affected", "version": "0", "versionType": "Client and server"}]}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>There is an elevation of privilege vulnerability in server\nand client components of Absolute Secure Access prior to version 13.07.\nAttackers with local access and valid desktop user credentials can elevate\ntheir privilege to system level by passing invalid address data to the vulnerable\ncomponent. This could be used to\nmanipulate process tokens to elevate the privilege of a normal process to\nSystem. The scope is changed, the impact to system confidentiality and\nintegrity is high, the impact to the availability of the effected component is\nnone. </p>"}], "value": "There is an elevation of privilege vulnerability in server\nand client components of Absolute Secure Access prior to version 13.07.\nAttackers with local access and valid desktop user credentials can elevate\ntheir privilege to system level by passing invalid address data to the vulnerable\ncomponent. This could be used to\nmanipulate process tokens to elevate the privilege of a normal process to\nSystem. The scope is changed, the impact to system confidentiality and\nintegrity is high, the impact to the availability of the effected component is\nnone."}], "impacts": [{"capecId": "CAPEC-69", "descriptions": [{"lang": "en", "value": "CAPEC-69 Target Programs with Elevated Privileges"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-822", "description": "CWE-822 Untrusted Pointer Dereference", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "b6533044-ea05-4482-8458-7bddeca0d079", "shortName": "Absolute", "dateUpdated": "2024-07-25T17:00:38.151Z"}, "references": [{"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1307/cve-2024-40872/"}], "source": {"discovery": "UNKNOWN"}, "title": "Elevation of privilege in Absolute Secure Access clients and servers", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"affected": [{"vendor": "absolute", "product": "secure_access", "cpes": ["cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "13.07", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-07-31T13:50:11.226191Z", "id": "CVE-2024-40872", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-07-31T13:51:51.917Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T04:39:55.376Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1307/cve-2024-40872/", "tags": ["x_transferred"]}]}]}}