Privilege escalation in Carousel - CVE-2018-18929
Published: February 6, 2019
Vulnerability identifier: #VU17396
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-18929
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Tightrope
Affected software:
Carousel
Carousel
Detailed vulnerability description
The vulnerability allows a remote attacker with administrative privileges can gain full access to the system.
The vulnerability exists due to the Unattend.xml file left on the system included the creation of a local admin account (along with the password). A remote attacker can use an Unattend.xml file to control various settings on the new system when Windows systems are imaged.
The vulnerability exists due to the Unattend.xml file left on the system included the creation of a local admin account (along with the password). A remote attacker can use an Unattend.xml file to control various settings on the new system when Windows systems are imaged.
How to mitigate CVE-2018-18929
Patch will be available on February 8.