This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A critical security flaw in Quest KACE SMA allowing **Privilege Escalation**.β¦
π‘οΈ **Root Cause**: **CWE-863** (Incorrect Authorization). <br>π **Flaw**: The system fails to properly verify permissions, allowing unauthorized users to access restricted functions or escalate their rights.
Q3Who is affected? (Versions/Components)
π’ **Affected Vendor**: Quest Software. <br>π¦ **Product**: Quest KACE Systems Management Appliance. <br>π **Versions**: <br>- **14.0.x** before **14.0.97** <br>- **14.1.x** before **14.1.19**
Q4What can hackers do? (Privileges/Data)
π **Attacker Actions**: <br>- **Privilege Escalation**: Move from low-level user to Admin/Root. <br>- **Data Theft**: Access sensitive IT asset data (High Confidentiality loss).β¦
π΅οΈ **Public Exploit**: **No**. <br>- The `pocs` field is empty. <br>- No known Proof-of-Concept (PoC) or wild exploitation reported yet. <br>- **But**: CVSS score is 9.8 (Critical), so high-risk tools may emerge quickly.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1. Check your KACE SMA version number. <br>2. Is it **< 14.0.97** or **< 14.1.19**? <br>3. If yes, you are vulnerable. <br>4. Monitor Quest Support KB for specific detection signatures.
Q8Is it fixed officially? (Patch/Mitigation)
β **Official Fix**: **Yes**. <br>- **Patch 14.0.97** for the 14.0 branch. <br>- **Patch 14.1.19** for the 14.1 branch. <br>- Reference: Quest Support KB 4378559.