Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
Low
Attack Vector
Local
0

CVE-2024-45770

Disclosure Date: September 19, 2024
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
4.4 Medium
Impact Score:
2.5
Exploitability Score:
1.8
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
Low
Integrity (I):
Low
Availability (A):
None

General Information

Vendors

  • Red Hat

Products

  • Red Hat Enterprise Linux 8,
  • Red Hat Enterprise Linux 8.2 Advanced Update Support,
  • Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support,
  • Red Hat Enterprise Linux 8.4 Telecommunications Update Service,
  • Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions,
  • Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support,
  • Red Hat Enterprise Linux 8.6 Telecommunications Update Service,
  • Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions,
  • Red Hat Enterprise Linux 8.8 Extended Update Support,
  • Red Hat Enterprise Linux 9,
  • Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions,
  • Red Hat Enterprise Linux 9.2 Extended Update Support,
  • Red Hat Enterprise Linux 6,
  • Red Hat Enterprise Linux 7
Technical Analysis