A privilege escalation vulnerability may enable a service account to elevate its privileges.
The sudo rules configured for a local service account were excessively permissive, potentially allowing administrative access if a malicious actor could execute arbitrary commands as that account.
It is important to note that no such vector has been identified in this instance.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://security.nozominetworks.com/NN-2025:2-01 |
|
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 10 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Jun 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A privilege escalation vulnerability may enable a service account to elevate its privileges. The sudo rules configured for a local service account were excessively permissive, potentially allowing administrative access if a malicious actor could execute arbitrary commands as that account. It is important to note that no such vector has been identified in this instance. | |
| Title | Privilege escalation in Guardian/CMC before 24.6.0 | |
| Weaknesses | CWE-250 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Nozomi
Published: 2025-06-10T10:31:02.099Z
Updated: 2025-06-10T14:28:19.863Z
Reserved: 2024-12-31T11:12:59.363Z
Link: CVE-2024-13090
Updated: 2025-06-10T14:28:09.811Z
Status : Awaiting Analysis
Published: 2025-06-10T11:15:52.477
Modified: 2025-06-12T16:06:39.330
Link: CVE-2024-13090
No data.