CVE Vulnerabilities

CVE-2022-31594

Improper Privilege Management

Published: Jun 14, 2022 | Modified: Nov 21, 2024
CVSS 3.x
6.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A highly privileged user can exploit SUID-root program to escalate his privileges to root on a local Unix system.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
Adaptive_server_enterpriseSap16.0 (including)16.0 (including)
Adaptive_server_enterpriseSapkernel_7.22 (including)kernel_7.22 (including)
Adaptive_server_enterpriseSapkernel_7.49 (including)kernel_7.49 (including)
Adaptive_server_enterpriseSapkernel_7.53 (including)kernel_7.53 (including)
Adaptive_server_enterpriseSapkrnl64nuc_7.22 (including)krnl64nuc_7.22 (including)
Adaptive_server_enterpriseSapkrnl64nuc_7.22ext (including)krnl64nuc_7.22ext (including)
Adaptive_server_enterpriseSapkrnl64nuc_7.49 (including)krnl64nuc_7.49 (including)
Adaptive_server_enterpriseSapkrnl64uc_7.22 (including)krnl64uc_7.22 (including)
Adaptive_server_enterpriseSapkrnl64uc_7.22ext (including)krnl64uc_7.22ext (including)
Adaptive_server_enterpriseSapkrnl64uc_7.49 (including)krnl64uc_7.49 (including)
Adaptive_server_enterpriseSapkrnl64uc_7.53 (including)krnl64uc_7.53 (including)

Potential Mitigations

References