CA » Ehealth Performance Manager : Security Vulnerabilities, CVEs, CVSS score >= 6
CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a setuid (and/or setgid) file. When a component is run as an argument of the runpicEhealth executable, the script code will be executed as the ehealth user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Max CVSS
7.8
EPSS Score
0.05%
Published
2021-03-26
Updated
2024-03-21
CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicious library in the writable RPATH, to be dynamically linked when the FtpCollector executable is run. The code in the library will be executed as the root user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Max CVSS
8.8
EPSS Score
0.05%
Published
2021-03-26
Updated
2024-03-21
2 vulnerabilities found