Overview
- Description
- BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) versions 23.2.1 and 23.2.2 contain a command injection vulnerability which can be exploited through a malicious HTTP request. Successful exploitation of this vulnerability can allow an unauthenticated remote attacker to execute underlying operating system commands within the context of the site user. This issue is fixed in version 23.2.3.
- Source
- 9119a7d8-5eab-497f-8521-727c672e3725
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:beyondtrust:privileged_remote_access:23.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "402E7658-AAFA-41FF-A4E1-1DF4FD845BC3" }, { "criteria": "cpe:2.3:a:beyondtrust:privileged_remote_access:23.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3366D2EE-532C-4741-B32A-575E8B1A9AF3" }, { "criteria": "cpe:2.3:a:beyondtrust:remote_support:23.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FABCD6F1-8D5A-4373-83B5-9DDE81331343" }, { "criteria": "cpe:2.3:a:beyondtrust:remote_support:23.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E495D6D-7D56-41E6-B62A-0081AD9146BD" } ], "operator": "OR" } ] } ]