Vulnerability Details : CVE-2015-7862
Persistent Accelerite Radia Client Automation (formerly HP Client Automation) 7.9 through 9.1 before 2015-02-19 improperly implements the Role Based Access Control feature, which might allow remote attackers to modify an account's role assignments via unspecified vectors.
Products affected by CVE-2015-7862
- cpe:2.3:a:accelerite:radia_client_automation:7.9:*:*:*:*:*:*:*
- cpe:2.3:a:accelerite:radia_client_automation:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:accelerite:radia_client_automation:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:accelerite:radia_client_automation:9.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-7862
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 54 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-7862
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2015-7862
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-7862
-
https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features
Accelerite releases solutions and best practices to enhance the security for RBAC and Remote Notify featuresVendor Advisory
-
http://www.securitytracker.com/id/1033862
Persistent Systems Accelerite Radia Client Automation (HP Client Automation) Bugs Let Remote Users Modify Access Control Settings and Bypass Security Restrictions - SecurityTracker
Jump to