#VU17793 Privilege escalation in Data Center Manager SDK


Published: 2019-02-20

Vulnerability identifier: #VU17793

Vulnerability risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-0105

CWE-ID: CWE-264

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Data Center Manager SDK
Client/Desktop applications / File managers, FTP clients

Vendor: Intel

Description
The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to insufficient file permissions checking in install routine for Intel(R) Data Center Manager SDK. A remote attacker can trick the victim into processing a specially crafted input and gain elevated privileges to conduct further attacks.

Mitigation
Update to version 5.0.2.

Vulnerable software versions

Data Center Manager SDK: 5.0.0 - 5.0.1


External links
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability