Vulnerability Description
CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicious library in the writable RPATH, to be dynamically linked when the FtpCollector executable is run. The code in the library will be executed as the root user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ca | Ehealth Performance Manager | <= 6.3.2.12 |
Related Weaknesses (CWE)
References
- https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ExploitThird Party Advisory
- https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ExploitThird Party Advisory
FAQ
What is CVE-2021-28249?
CVE-2021-28249 is a vulnerability with a CVSS score of 8.8 (HIGH). CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicio...
How severe is CVE-2021-28249?
CVE-2021-28249 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-28249?
Check the references section above for vendor advisories and patch information. Affected products include: Ca Ehealth Performance Manager.