- Description
- BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) versions 23.2.1 and 23.2.2 contain a command injection vulnerability which can be exploited through a malicious HTTP request. Successful exploitation of this vulnerability can allow an unauthenticated remote attacker to execute underlying operating system commands within the context of the site user. This issue is fixed in version 23.2.3.
- Source
- 9119a7d8-5eab-497f-8521-727c672e3725
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:beyondtrust:privileged_remote_access:23.2.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "402E7658-AAFA-41FF-A4E1-1DF4FD845BC3"
},
{
"criteria": "cpe:2.3:a:beyondtrust:privileged_remote_access:23.2.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3366D2EE-532C-4741-B32A-575E8B1A9AF3"
},
{
"criteria": "cpe:2.3:a:beyondtrust:remote_support:23.2.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FABCD6F1-8D5A-4373-83B5-9DDE81331343"
},
{
"criteria": "cpe:2.3:a:beyondtrust:remote_support:23.2.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5E495D6D-7D56-41E6-B62A-0081AD9146BD"
}
],
"operator": "OR"
}
]
}
]