CVE-2024-11220

A local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code within the rdlx file of the report executes with SYSTEM privileges, resulting in privilege escalation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openautomationsoftware:open_automation_software:*:*:*:*:*:*:*:*

History

23 Jan 2025, 16:54

Type Values Removed Values Added
CPE cpe:2.3:a:openautomationsoftware:open_automation_software:*:*:*:*:*:*:*:*
First Time Openautomationsoftware
Openautomationsoftware open Automation Software
Summary
  • (es) Un usuario local de bajo nivel en la máquina servidor con credenciales para los servicios OAS en ejecución puede crear y ejecutar un informe con un archivo rdlx en el propio sistema servidor. Cualquier código dentro del archivo rdlx del informe se ejecuta con privilegios de SYSTEM, lo que da como resultado una escalada de privilegios.
CWE CWE-732
References () https://openautomationsoftware.com/downloads/ - () https://openautomationsoftware.com/downloads/ - Product
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-03 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-03 - US Government Resource

06 Dec 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-06 18:15

Updated : 2025-01-23 16:54


NVD link : CVE-2024-11220

Mitre link : CVE-2024-11220

CVE.ORG link : CVE-2024-11220


JSON object : View

Products Affected

openautomationsoftware

  • open_automation_software
CWE
CWE-279

Incorrect Execution-Assigned Permissions

CWE-732

Incorrect Permission Assignment for Critical Resource