Vulnerability Details CVE-2024-12356
A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.93
EPSS Ranking 99.8%
CVSS Severity
CVSS v3 Score 9.8
Proposed Action
BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain a command injection vulnerability, which can allow an unauthenticated attacker to inject commands that are run as a site user.
Ransomware Campaign
Unknown
Products affected by CVE-2024-12356
-
cpe:2.3:a:beyondtrust:privileged_remote_access:-
-
cpe:2.3:a:beyondtrust:privileged_remote_access:22.2.1
-
cpe:2.3:a:beyondtrust:privileged_remote_access:22.2.2
-
cpe:2.3:a:beyondtrust:privileged_remote_access:22.3.1
-
cpe:2.3:a:beyondtrust:privileged_remote_access:22.3.2
-
cpe:2.3:a:beyondtrust:privileged_remote_access:22.3.3
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.1.1
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.1.2
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.1.3
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.1.4
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.2.1
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.2.2
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.2.3
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.2.4
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.2.5
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.3.1
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.3.2
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.3.3
-
cpe:2.3:a:beyondtrust:privileged_remote_access:23.3.4
-
cpe:2.3:a:beyondtrust:privileged_remote_access:24.1.1
-
cpe:2.3:a:beyondtrust:privileged_remote_access:24.1.2
-
cpe:2.3:a:beyondtrust:privileged_remote_access:24.1.3
-
cpe:2.3:a:beyondtrust:privileged_remote_access:24.1.4
-
cpe:2.3:a:beyondtrust:privileged_remote_access:24.2.2
-
cpe:2.3:a:beyondtrust:privileged_remote_access:24.2.3
-
cpe:2.3:a:beyondtrust:privileged_remote_access:24.2.4
-
cpe:2.3:a:beyondtrust:privileged_remote_access:24.3.1
-
cpe:2.3:a:beyondtrust:remote_support:-
-
cpe:2.3:a:beyondtrust:remote_support:10.0.0
-
cpe:2.3:a:beyondtrust:remote_support:10.0.1
-
cpe:2.3:a:beyondtrust:remote_support:10.0.11
-
cpe:2.3:a:beyondtrust:remote_support:10.0.12
-
cpe:2.3:a:beyondtrust:remote_support:10.0.15
-
cpe:2.3:a:beyondtrust:remote_support:10.0.2
-
cpe:2.3:a:beyondtrust:remote_support:10.0.4
-
cpe:2.3:a:beyondtrust:remote_support:10.0.5
-
cpe:2.3:a:beyondtrust:remote_support:10.0.6
-
cpe:2.3:a:beyondtrust:remote_support:10.0.7
-
cpe:2.3:a:beyondtrust:remote_support:10.0.9
-
cpe:2.3:a:beyondtrust:remote_support:10.1
-
cpe:2.3:a:beyondtrust:remote_support:10.1.2
-
cpe:2.3:a:beyondtrust:remote_support:10.1.3
-
cpe:2.3:a:beyondtrust:remote_support:10.1.5
-
cpe:2.3:a:beyondtrust:remote_support:10.1.7
-
cpe:2.3:a:beyondtrust:remote_support:10.2
-
cpe:2.3:a:beyondtrust:remote_support:10.2.10
-
cpe:2.3:a:beyondtrust:remote_support:10.2.2
-
cpe:2.3:a:beyondtrust:remote_support:10.2.3
-
cpe:2.3:a:beyondtrust:remote_support:10.2.6
-
cpe:2.3:a:beyondtrust:remote_support:10.2.8
-
cpe:2.3:a:beyondtrust:remote_support:10.2.9
-
cpe:2.3:a:beyondtrust:remote_support:10.3.0
-
cpe:2.3:a:beyondtrust:remote_support:10.3.1
-
cpe:2.3:a:beyondtrust:remote_support:10.3.2
-
cpe:2.3:a:beyondtrust:remote_support:10.3.3
-
cpe:2.3:a:beyondtrust:remote_support:10.3.4
-
cpe:2.3:a:beyondtrust:remote_support:10.3.6
-
cpe:2.3:a:beyondtrust:remote_support:10.3.8
-
cpe:2.3:a:beyondtrust:remote_support:10.4.0
-
cpe:2.3:a:beyondtrust:remote_support:10.4.1
-
cpe:2.3:a:beyondtrust:remote_support:10.4.11
-
cpe:2.3:a:beyondtrust:remote_support:10.4.3
-
cpe:2.3:a:beyondtrust:remote_support:10.4.4
-
cpe:2.3:a:beyondtrust:remote_support:10.4.5
-
cpe:2.3:a:beyondtrust:remote_support:10.4.6
-
cpe:2.3:a:beyondtrust:remote_support:10.4.8
-
cpe:2.3:a:beyondtrust:remote_support:10.4.9
-
cpe:2.3:a:beyondtrust:remote_support:10.5.0
-
cpe:2.3:a:beyondtrust:remote_support:10.5.1
-
cpe:2.3:a:beyondtrust:remote_support:10.5.2
-
cpe:2.3:a:beyondtrust:remote_support:10.5.3
-
cpe:2.3:a:beyondtrust:remote_support:10.5.4
-
cpe:2.3:a:beyondtrust:remote_support:10.5.5
-
cpe:2.3:a:beyondtrust:remote_support:10.6.0
-
cpe:2.3:a:beyondtrust:remote_support:10.6.2
-
cpe:2.3:a:beyondtrust:remote_support:10.6.3
-
cpe:2.3:a:beyondtrust:remote_support:10.6.4
-
cpe:2.3:a:beyondtrust:remote_support:10.6.5
-
cpe:2.3:a:beyondtrust:remote_support:10.6.6
-
cpe:2.3:a:beyondtrust:remote_support:11.1.0
-
cpe:2.3:a:beyondtrust:remote_support:11.1.1
-
cpe:2.3:a:beyondtrust:remote_support:11.1.2
-
cpe:2.3:a:beyondtrust:remote_support:11.1.3
-
cpe:2.3:a:beyondtrust:remote_support:11.1.4
-
cpe:2.3:a:beyondtrust:remote_support:12.1.1
-
cpe:2.3:a:beyondtrust:remote_support:12.1.2
-
cpe:2.3:a:beyondtrust:remote_support:12.1.4
-
cpe:2.3:a:beyondtrust:remote_support:12.1.5
-
cpe:2.3:a:beyondtrust:remote_support:12.2.1
-
cpe:2.3:a:beyondtrust:remote_support:12.2.3
-
cpe:2.3:a:beyondtrust:remote_support:12.2.4
-
cpe:2.3:a:beyondtrust:remote_support:12.3.1
-
cpe:2.3:a:beyondtrust:remote_support:12.3.2
-
cpe:2.3:a:beyondtrust:remote_support:12.3.4
-
cpe:2.3:a:beyondtrust:remote_support:12.3.5
-
cpe:2.3:a:beyondtrust:remote_support:13.1.1
-
cpe:2.3:a:beyondtrust:remote_support:13.1.2
-
cpe:2.3:a:beyondtrust:remote_support:13.1.3
-
cpe:2.3:a:beyondtrust:remote_support:14.1.1
-
cpe:2.3:a:beyondtrust:remote_support:14.1.2
-
cpe:2.3:a:beyondtrust:remote_support:14.1.3
-
cpe:2.3:a:beyondtrust:remote_support:14.1.4
-
cpe:2.3:a:beyondtrust:remote_support:14.2.1
-
cpe:2.3:a:beyondtrust:remote_support:14.2.2
-
cpe:2.3:a:beyondtrust:remote_support:14.2.3
-
cpe:2.3:a:beyondtrust:remote_support:14.3.1
-
cpe:2.3:a:beyondtrust:remote_support:14.3.2
-
cpe:2.3:a:beyondtrust:remote_support:14.3.3
-
cpe:2.3:a:beyondtrust:remote_support:15.1.1
-
cpe:2.3:a:beyondtrust:remote_support:15.1.2
-
cpe:2.3:a:beyondtrust:remote_support:15.1.3
-
cpe:2.3:a:beyondtrust:remote_support:15.1.4
-
cpe:2.3:a:beyondtrust:remote_support:15.2.1
-
cpe:2.3:a:beyondtrust:remote_support:15.2.2
-
cpe:2.3:a:beyondtrust:remote_support:15.2.3
-
cpe:2.3:a:beyondtrust:remote_support:16.1.1
-
cpe:2.3:a:beyondtrust:remote_support:16.1.2
-
cpe:2.3:a:beyondtrust:remote_support:16.1.3
-
cpe:2.3:a:beyondtrust:remote_support:16.1.4
-
cpe:2.3:a:beyondtrust:remote_support:16.1.5
-
cpe:2.3:a:beyondtrust:remote_support:16.2.1
-
cpe:2.3:a:beyondtrust:remote_support:16.2.2
-
cpe:2.3:a:beyondtrust:remote_support:16.2.4
-
cpe:2.3:a:beyondtrust:remote_support:16.2.5
-
cpe:2.3:a:beyondtrust:remote_support:16.2.6
-
cpe:2.3:a:beyondtrust:remote_support:16.2.7
-
cpe:2.3:a:beyondtrust:remote_support:16.2.8
-
cpe:2.3:a:beyondtrust:remote_support:16.2.9
-
cpe:2.3:a:beyondtrust:remote_support:17.1.1
-
cpe:2.3:a:beyondtrust:remote_support:17.1.2
-
cpe:2.3:a:beyondtrust:remote_support:17.1.3
-
cpe:2.3:a:beyondtrust:remote_support:17.1.4
-
cpe:2.3:a:beyondtrust:remote_support:17.1.5
-
cpe:2.3:a:beyondtrust:remote_support:18.1.1
-
cpe:2.3:a:beyondtrust:remote_support:18.1.2
-
cpe:2.3:a:beyondtrust:remote_support:18.1.3
-
cpe:2.3:a:beyondtrust:remote_support:18.1.4
-
cpe:2.3:a:beyondtrust:remote_support:18.2.1
-
cpe:2.3:a:beyondtrust:remote_support:18.2.11
-
cpe:2.3:a:beyondtrust:remote_support:18.2.2
-
cpe:2.3:a:beyondtrust:remote_support:18.2.3
-
cpe:2.3:a:beyondtrust:remote_support:18.2.5
-
cpe:2.3:a:beyondtrust:remote_support:18.2.6
-
cpe:2.3:a:beyondtrust:remote_support:18.2.7
-
cpe:2.3:a:beyondtrust:remote_support:18.2.8
-
cpe:2.3:a:beyondtrust:remote_support:18.2.9
-
cpe:2.3:a:beyondtrust:remote_support:19.1.1
-
cpe:2.3:a:beyondtrust:remote_support:19.1.2
-
cpe:2.3:a:beyondtrust:remote_support:19.1.3
-
cpe:2.3:a:beyondtrust:remote_support:19.1.5
-
cpe:2.3:a:beyondtrust:remote_support:19.1.7
-
cpe:2.3:a:beyondtrust:remote_support:19.1.8
-
cpe:2.3:a:beyondtrust:remote_support:23.2.1
-
cpe:2.3:a:beyondtrust:remote_support:23.2.2
-
cpe:2.3:a:beyondtrust:remote_support:24.3.1
-
cpe:2.3:a:beyondtrust:remote_support:9.0.0
-
cpe:2.3:a:beyondtrust:remote_support:9.0.1
-
cpe:2.3:a:beyondtrust:remote_support:9.0.2
-
cpe:2.3:a:beyondtrust:remote_support:9.1.0
-
cpe:2.3:a:beyondtrust:remote_support:9.1.1
-
cpe:2.3:a:beyondtrust:remote_support:9.1.2
-
cpe:2.3:a:beyondtrust:remote_support:9.1.4
-
cpe:2.3:a:beyondtrust:remote_support:9.2.0
-
cpe:2.3:a:beyondtrust:remote_support:9.2.1
-
cpe:2.3:a:beyondtrust:remote_support:9.2.2
-
cpe:2.3:a:beyondtrust:remote_support:9.2.3
-
cpe:2.3:a:beyondtrust:remote_support:9.3.0
-
cpe:2.3:a:beyondtrust:remote_support:9.3.1
-
cpe:2.3:a:beyondtrust:remote_support:9.3.2
-
cpe:2.3:a:beyondtrust:remote_support:9.3.3