Overview
- Description
- vRealize Operations (7.x before 7.0.0.11287810, 6.7.x before 6.7.0.11286837 and 6.6.x before 6.6.1.11286876) contains a local privilege escalation vulnerability due to improper permissions of support scripts. Admin user of the vROps application with shell access may exploit this issue to elevate the privileges to root on a vROps machine. Note: the admin user (non-sudoer) should not be confused with root of the vROps machine.
- Source
- security@vmware.com
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 6.7
- Impact score
- 5.9
- Exploitability score
- 0.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-732
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:vrealize_operations:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEE0B252-1EC6-452B-9463-9BB1E7854589", "versionEndExcluding": "6.6.1.11286876", "versionStartIncluding": "6.6.0" }, { "criteria": "cpe:2.3:a:vmware:vrealize_operations:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "031E52FC-7125-4C5F-93B1-EAFDDD0592A1", "versionEndExcluding": "6.7.0.11286837", "versionStartIncluding": "6.7.0" }, { "criteria": "cpe:2.3:a:vmware:vrealize_operations:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "519AAEBA-95BE-4ACF-BFE7-FE33923DE6C9", "versionEndExcluding": "7.0.0.11287810", "versionStartIncluding": "7.0.0" } ], "operator": "OR" } ] } ]