cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

CVE-2024-2658: FlexNet Publisher potential local privilege escalation issue

CVE-2024-2658: FlexNet Publisher potential local privilege escalation issue

Summary

A potential vulnerability has been identified in FlexNet Publisher affecting versions prior to 2024 R1 (11.19.6.0). This issue may allow local privilege escalation due to an uncontrolled search path element. We advise customers to upgrade their FlexNet Publisher lmadmin.exe and FlexNet Publisher to version 2024 R1 (11.19.6.0) where this issue has been resolved.

Producers potentially affected by this issue include:

  1. Producers using lmadmin.exe prior to version 2024 R1 are affected by this vulnerability.
  2. Producers utilizing the vendor daemon with secure communications (TLS communications) enabled prior to FlexNet Publisher version 2024 R1 are affected by this vulnerability.

Description

A misconfiguration in FlexNet Publisher lmadmin.exe allows the OpenSSL configuration file to load from a non-existent directory. An unauthorized, locally authenticated user with low privileges can potentially create the directory and load a specially crafted openssl.conf file leading to the execution of a malicious DLL (Dynamic-Link Library) with elevated privileges.

Fix Version and Resolution

This issue is addressed in FlexNet Publisher 2024 R1 (11.19.6.0) release. As a precaution, we strongly advise producers to upgrade to FlexNet Publisher 2024 R1 (11.19.6.0) or later if they are affected. End users can reach out to their providers to ascertain whether they are impacted.

The latest version of the lmadmin can be downloaded from the FlexNet Publisher lmadmin download links page.

Producers can download the latest version of the FlexNet Publisher from the Product and License Center.  

Additional Information

CVSS Score / Severity:

Link to CVE: 

Credit:

For identifying this issue and disclosing it to Revenera PSIRT under the responsible disclosure process, we'd like to credit Xavier DANEST working with Trend Micro Zero Day Initiative.

Labels (1)
Was this article helpful? Yes No
No ratings
Version history
Last update:
‎May 15, 2024 05:15 PM
Updated by:
Contributors