Vulnerability Description
Execution with unnecessary privileges in PerkinElmer ProcessPlus allows an attacker to spawn a remote shell on the windows system.This issue affects ProcessPlus: through 1.11.6507.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Perkinelmer | Processplus | <= 1.11.6507.0 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2024/Jul/13ExploitMailing ListThird Party Advisory
- https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/ExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2024/Jul/13ExploitMailing ListThird Party Advisory
- https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/ExploitThird Party Advisory
FAQ
What is CVE-2024-6913?
CVE-2024-6913 is a vulnerability with a CVSS score of 8.8 (HIGH). Execution with unnecessary privileges in PerkinElmer ProcessPlus allows an attacker to spawn a remote shell on the windows system.This issue affects ProcessPlus: through 1.11.6507.0.
How severe is CVE-2024-6913?
CVE-2024-6913 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6913?
Check the references section above for vendor advisories and patch information. Affected products include: Perkinelmer Processplus, Microsoft Windows.