This vulnerability allows a high-privileged authenticated PAM user to achieve remote command execution on the affected PAM system by uploading a specially crafted upgrade file.
Metrics
Affected Vendors & Products
References
History
Wed, 05 Feb 2025 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 05 Feb 2025 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 30 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-434 | |
Metrics |
ssvc
|
Thu, 30 Jan 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability allows a high-privileged authenticated PAM user to achieve remote command execution on the affected PAM system by uploading a specially crafted upgrade file. | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: symantec
Published:
Updated: 2025-02-05T05:36:07.471Z
Reserved: 2025-01-22T08:29:34.305Z
Link: CVE-2025-24505

Updated: 2025-01-30T19:18:06.513Z

Status : Awaiting Analysis
Published: 2025-01-30T19:15:17.210
Modified: 2025-02-05T06:15:31.587
Link: CVE-2025-24505

No data.