Lucene search

K
zdiBen TurnerZDI-15-038
HistoryFeb 10, 2015 - 12:00 a.m.

(0Day) Persistent Systems Client Automation Command Injection Remote Code Execution Vulnerability

2015-02-1000:00:00
Ben Turner
www.zerodayinitiative.com
35

EPSS

0.945

Percentile

99.3%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Persistent Systems Client Automation. Authentication is not required to exploit this vulnerability. The flaw exists within the radexecd.exe component which listens by default on TCP port 3465. When handling a remote execution request the process does not properly authenticate the user issuing the request. The command to be executed is also not properly sanitized. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of SYSTEM. This vulnerability is different than ZDI-11-105.