Home

Description

A privilege escalation vulnerability may enable a service account to elevate its privileges. The sudo rules configured for a local service account were excessively permissive, potentially allowing administrative access if a malicious actor could execute arbitrary commands as that account. It is important to note that no such vector has been identified in this instance.

PUBLISHED Reserved 2024-12-31 | Published 2025-06-10 | Updated 2025-06-10 | Assigner Nozomi




HIGH: 7.3CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 7.0CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-250: Execution with Unnecessary Privileges

Product status

Default status
unaffected

Any version before 24.6.0
affected

Default status
unaffected

Any version before 24.6.0
affected

Credits

IOActive found this issue during a VAPT testing session commissioned by one of our customers. finder

References

security.nozominetworks.com/NN-2025:2-01

cve.org (CVE-2024-13090)

nvd.nist.gov (CVE-2024-13090)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.