Vulnerability Details CVE-2024-1764
Improper privilege management in Just-in-time (JIT) elevation module in Devolutions Server 2023.3.14.0 and earlier allows a user to continue using the elevated privilege even after the expiration under specific circumstances
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 21.6%
CVSS Severity
CVSS v3 Score 7.6
Products affected by CVE-2024-1764
-
cpe:2.3:a:devolutions:devolutions_server:-
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.11.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.13.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.14.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.15.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.16.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.17.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.18.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.19.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.20.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.9.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.2.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.13.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.3.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.2.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.2.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.2.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.2.9.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.11.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.14.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.17.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.18
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.20
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.21
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2021.1
-
cpe:2.3:a:devolutions:devolutions_server:2021.1.17
-
cpe:2.3:a:devolutions:devolutions_server:2021.1.18
-
cpe:2.3:a:devolutions:devolutions_server:2021.1.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.1.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.2.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.13.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.2
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.3.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.4.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.5.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.6.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.9.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.3.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.4.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.5.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.6.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.2
-
cpe:2.3:a:devolutions:devolutions_server:2023.2.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.3.14.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.3.4.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.3.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.3.8.0