Lucene search

K
vulnrichmentCyberDanubeVULNRICHMENT:CVE-2024-6913
HistoryJul 22, 2024 - 9:00 p.m.

CVE-2024-6913 Execution with Unnecessary Privileges

2024-07-2221:00:08
CWE-250
CyberDanube
github.com
7
cve-2024-6913
perkinelmer processplus
unnecessary privileges
remote shell
windows system

CVSS4

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

23.6%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

Execution with unnecessary privileges in PerkinElmer ProcessPlus allows an attacker to spawn a remote shell on the windows system.This issue affects ProcessPlus: through 1.11.6507.0.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:perkin_elmer:process_plus:*:*:*:*:*:*:*:*"
    ],
    "vendor": "perkin_elmer",
    "product": "process_plus",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "1.11.6507.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS4

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

23.6%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-6913