IBM Robotic Process Automation 21.0.0 through 21.0.7.17 and 23.0.0 through 23.0.18 could allow a local user to escalate their privileges. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service. A subsequent service or server restart will then run that binary with administrator privilege.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7177586 |
|
History
Tue, 25 Mar 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-732 | |
| CPEs | cpe:2.3:a:ibm:robotic_process_automation:*:*:*:*:*:*:*:* |
Tue, 21 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 18 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM Robotic Process Automation 21.0.0 through 21.0.7.17 and 23.0.0 through 23.0.18 could allow a local user to escalate their privileges. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service. A subsequent service or server restart will then run that binary with administrator privilege. | |
| Title | IBM Robotic Process Automation privilege escalation | |
| First Time appeared |
Ibm
Ibm robotic Process Automation |
|
| Weaknesses | CWE-277 | |
| CPEs | cpe:2.3:a:ibm:robotic_process_automation:21.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:robotic_process_automation:21.0.7.17:*:*:*:*:*:*:* cpe:2.3:a:ibm:robotic_process_automation:23.0.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:robotic_process_automation:23.0.18:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm robotic Process Automation |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ibm
Published: 2025-01-18T15:08:42.484Z
Updated: 2025-01-21T20:58:29.659Z
Reserved: 2024-10-28T10:49:59.191Z
Link: CVE-2024-51448
Updated: 2025-01-21T20:58:22.059Z
Status : Analyzed
Published: 2025-01-18T15:15:08.183
Modified: 2025-03-25T14:06:48.877
Link: CVE-2024-51448
No data.