{"vulnerability": "CVE-2024-51448", "sightings": [{"uuid": "eb951621-ac76-4db0-85b7-f6801473e4ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51448", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2299", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51448\n\ud83d\udd39 Description: IBM Robotic Process Automation 21.0.0 through 21.0.7.17 and 23.0.0 through 23.0.18 could allow a local user to escalate their privileges. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service. A subsequent service or server restart will then run that binary with administrator privilege.\n\ud83d\udccf Published: 2025-01-18T15:08:42.484Z\n\ud83d\udccf Modified: 2025-01-18T15:08:42.484Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7177586", "creation_timestamp": "2025-01-18T15:58:02.000000Z"}, {"uuid": "01f386cf-f2f7-4715-b5b6-6be4d5f169dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51448", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113849989784063839", "content": "", "creation_timestamp": "2025-01-18T15:09:39.416257Z"}, {"uuid": "f31459dd-89d0-4074-9867-05fd7eae3ced", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51448", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfzlzre6br2j", "content": "", "creation_timestamp": "2025-01-18T15:15:31.210510Z"}, {"uuid": "136d60e4-7a09-41b0-b074-4f83f923d11e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51448", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfznf32kev2g", "content": "", "creation_timestamp": "2025-01-18T15:39:44.917564Z"}, {"uuid": "77d9da5b-185e-403f-b3a3-81fc255d6b9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51448", "type": "seen", "source": "https://t.me/cvedetector/15804", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51448 - IBM Robotic Process Automation Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51448 \nPublished : Jan. 18, 2025, 3:15 p.m. | 35\u00a0minutes ago \nDescription : IBM Robotic Process Automation 21.0.0 through 21.0.7.17 and 23.0.0 through 23.0.18 could allow a local user to escalate their privileges. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service. A subsequent service or server restart will then run that binary with administrator privilege. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-18T17:03:52.000000Z"}]}