{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-12686","assignerOrgId":"13061848-ea10-403d-bd75-c83a022c2891","state":"PUBLISHED","assignerShortName":"BT","dateReserved":"2024-12-16T18:58:57.921Z","datePublished":"2024-12-18T20:23:57.909Z","dateUpdated":"2025-10-21T22:55:34.086Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Remote Support(RS) & Privileged Remote Access(PRA)","vendor":"BeyondTrust","versions":[{"lessThanOrEqual":"24.3.1","status":"affected","version":"0","versionType":"custom"}]}],"datePublic":"2024-12-18T19:41:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">A vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) which can allow an attacker with existing administrative privileges to inject commands and run as a site user.</span><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;</span><br>"}],"value":"A vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) which can allow an attacker with existing administrative privileges to inject commands and run as a site user."}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88 OS Command Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.6,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"13061848-ea10-403d-bd75-c83a022c2891","shortName":"BT","dateUpdated":"2024-12-18T20:23:57.909Z"},"references":[{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12686"},{"url":"https://www.beyondtrust.com/trust-center/security-advisories/bt24-11"}],"source":{"discovery":"UNKNOWN"},"title":"Command Injection vulnerability in Remote Support(RS) & Privilege Remote Access (PRA)","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-12686","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-01-13T15:32:45.601180Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2025-01-13","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-12686"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-12686","tags":["government-resource"]}],"timeline":[{"time":"2025-01-13T00:00:00.000Z","lang":"en","value":"CVE-2024-12686 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T22:55:34.086Z"}}]}}