Vulnerability type:- CWE-78:Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Vulnerability vector:
- Base vulnerability score (CVSSv3.1): CVSS:3.1/ AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity (CVSSv3.1): 9.8 (critical)
- Base vulnerability score (CVSSv4.0): CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
- Severity (CVSSv4.0): 9.3 (critical)
Description:
The vulnerability was identified in Yealink Meeting Server (YMS) , versions < V26.0.0.66.
The discovered vulnerability can be exploited by an internal attacker to execute commands with superuser privileges, which can lead to privilege escalation on the vulnerable host.
Vulnerability status: Confirmed by vendor
Date of vulnerability remediation: 24.11.2023
Recommendations:
- Update to version V26.0.0.67 or higher
Additional information: Security advisory
Researcher: Positive Technologies
Identifier:
CVE- 2024-24091
BDU:2024-00482
Vendor:
Yealink
Vulnerable product:
Yealink Meeting Server (YMS)
Vulnerable version:
< V26.0.0.66
Get in touch
Fill in the form and our specialists
will contact you shortly
will contact you shortly