Xorux 2.41 lpar2rrd/stor2rrd privilege escalation – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on November 8th, 2019 📆 | 5502 Views ⚑


Xorux 2.41 lpar2rrd/stor2rrd privilege escalation

CVSS Meta Temp ScoreCurrent Exploit Price (≈)CTI Interest Score

A vulnerability was found in Xorux 2.41. It has been classified as critical. Affected is an unknown part of the component lpar2rrd/stor2rrd. The manipulation with an unknown input leads to a privilege escalation vulnerability. CWE is classifying the issue as CWE-269. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was released 11/01/2019 (Website). The advisory is shared for download at justashadow.com. The successful exploitation needs a single authentication. Technical details are unknown but a public exploit is available.

After immediately, there has been an exploit disclosed. It is declared as proof-of-concept. The exploit is shared for download at justashadow.com.

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.


VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.1

VulDB Base Score: 5.5
VulDB Temp Score: 5.1
VulDB Vector: 🔒
VulDB Reliability: 🔍


VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Privilege escalation (CWE-269)
Local: Yes
Remote: No

Availability: 🔒
Access: Public
Status: Proof-of-Concept
Download: 🔒

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: no mitigation known

0-Day Time: 🔒
Exploit Delay Time: 🔍

11/01/2019 Advisory disclosed
11/01/2019 +0 days Exploit disclosed
11/07/2019 +6 days VulDB entry created
11/07/2019 +0 days VulDB last updateAdvisory: justashadow.com
Status: UnconfirmedCreated: 11/07/2019 07:46 PM
Complete: 🔍
Submitter: gotenigatien


No comments yet. Please log in to comment.

Download it now for free!


Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *