cve-2024-11467
Vulnerability from cvelistv5
Published
2025-02-04 22:12
Modified
2025-02-05 15:05
Severity ?
EPSS score ?
Summary
Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a logic flaw. Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Omnissa | Omnissa Horizon Client for MacOS |
Version: Omnissa Horizon Client for macOS 2406 or earlier |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-11467", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T15:04:48.828520Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T15:05:31.472Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "Omnissa Horizon Client for MacOS", "vendor": "Omnissa", "versions": [ { "status": "affected", "version": "Omnissa Horizon Client for macOS 2406 or earlier" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Omnissa would like to thank Paul Montgomery (@nullevent) of TikTok US Data Security, Red Team for reporting this issue to us." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a logic flaw.\u0026nbsp;Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed.\u003cbr\u003e" } ], "value": "Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a logic flaw.\u00a0Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Logic Flaw Vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T22:17:27.603Z", "orgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52", "shortName": "Omnissa" }, "references": [ { "url": "https://static.omnissa.com/sites/default/files/OMSA-2024-0002.pdf" }, { "url": "https://www.omnissa.com/omnissa-security-response/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52", "assignerShortName": "Omnissa", "cveId": "CVE-2024-11467", "datePublished": "2025-02-04T22:12:39.209Z", "dateReserved": "2024-11-19T21:12:41.649Z", "dateUpdated": "2025-02-05T15:05:31.472Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-11467\",\"sourceIdentifier\":\"de5a6978-88fe-4c27-a7df-d0d5b52d5b52\",\"published\":\"2025-02-04T23:15:08.580\",\"lastModified\":\"2025-02-05T15:15:20.253\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a logic flaw.\u00a0Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"de5a6978-88fe-4c27-a7df-d0d5b52d5b52\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"references\":[{\"url\":\"https://static.omnissa.com/sites/default/files/OMSA-2024-0002.pdf\",\"source\":\"de5a6978-88fe-4c27-a7df-d0d5b52d5b52\"},{\"url\":\"https://www.omnissa.com/omnissa-security-response/\",\"source\":\"de5a6978-88fe-4c27-a7df-d0d5b52d5b52\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-11467\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-05T15:04:48.828520Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-269\", \"description\": \"CWE-269 Improper Privilege Management\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-05T15:05:27.679Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Omnissa would like to thank Paul Montgomery (@nullevent) of TikTok US Data Security, Red Team for reporting this issue to us.\"}], \"impacts\": [{\"capecId\": \"CAPEC-233\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-233 Privilege Escalation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Omnissa\", \"product\": \"Omnissa Horizon Client for MacOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"Omnissa Horizon Client for macOS 2406 or earlier\"}], \"platforms\": [\"MacOS\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://static.omnissa.com/sites/default/files/OMSA-2024-0002.pdf\"}, {\"url\": \"https://www.omnissa.com/omnissa-security-response/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a logic flaw.\\u00a0Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a logic flaw.\u0026nbsp;Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed.\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Logic Flaw Vulnerability\"}]}], \"providerMetadata\": {\"orgId\": \"de5a6978-88fe-4c27-a7df-d0d5b52d5b52\", \"shortName\": \"Omnissa\", \"dateUpdated\": \"2025-02-04T22:17:27.603Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-11467\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-05T15:05:31.472Z\", \"dateReserved\": \"2024-11-19T21:12:41.649Z\", \"assignerOrgId\": \"de5a6978-88fe-4c27-a7df-d0d5b52d5b52\", \"datePublished\": \"2025-02-04T22:12:39.209Z\", \"assignerShortName\": \"Omnissa\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.