We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-35164

Apache Guacamole: Improper input validation of console codes



Description

The terminal emulator of Apache Guacamole 1.5.5 and older does not properly validate console codes received from servers via text-based protocols like SSH. If a malicious user has access to a text-based connection, a specially-crafted sequence of console codes could allow arbitrary code to be executed with the privileges of the running guacd process. Users are recommended to upgrade to version 1.6.0, which fixes this issue.

Reserved 2024-05-10 | Published 2025-07-02 | Updated 2025-07-02 | Assigner apache


MEDIUM: 6.8CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-129 Improper Validation of Array Index

Product status

Default status
unaffected

0.8.0
affected

Timeline

2024-05-04:Reported to security@guacamole.apache.org
2024-05-04:Report acknowledged by project
2024-05-10:Report confirmed by project

Credits

Tizian Seehaus (Tibotix) reporter

References

lists.apache.org/thread/sgs8lplbkrpvd3hrvcnnxh3028h4py70 vendor-advisory

cve.org (CVE-2024-35164)

nvd.nist.gov (CVE-2024-35164)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-35164

Support options

Helpdesk Chat, Email, Knowledgebase