CVE-2024-0622

8.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in OpenText Operations Agent on non-Windows platforms. An authenticated local user could exploit this to gain elevated privileges, potentially root access. Affected versions are 12.15 and 12.20-12.25 when installed on Linux, Unix, or other non-Windows operating systems.

💻 Affected Systems

Products:
  • OpenText Operations Agent
Versions: 12.15 and 12.20 through 12.25
Operating Systems: Linux, Unix, AIX, Solaris, HP-UX, Other non-Windows platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations on non-Windows platforms. Windows installations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains root privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement within the environment.

🟠

Likely Case

Malicious insider or compromised user account escalates to root to install backdoors, steal sensitive data, or disrupt operations.

🟢

If Mitigated

Limited impact due to strong access controls, least privilege principles, and network segmentation preventing lateral movement.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access; internet-facing systems are not directly vulnerable unless attackers first gain local access through other means.
🏢 Internal Only: HIGH - Internal users with local access to affected systems can exploit this vulnerability to gain root privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local authenticated access. Exploit complexity is likely low based on CVSS score and privilege escalation nature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://portal.microfocus.com/s/article/KM000026555?language=en_US

Restart Required: Yes

Instructions:

1. Review vendor advisory KM000026555. 2. Download and apply the appropriate patch from OpenText. 3. Restart the Operations Agent service. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Restrict local access

linux

Limit local user access to systems running vulnerable Operations Agent versions

Review and tighten local user permissions using sudoers, PAM, or other access control mechanisms

Implement least privilege

linux

Ensure users only have necessary permissions and cannot execute arbitrary commands

Use tools like SELinux, AppArmor, or chroot to restrict process capabilities

🧯 If You Can't Patch

  • Isolate affected systems in segmented network zones to limit lateral movement potential
  • Implement strict monitoring and alerting for privilege escalation attempts and unusual root activity

🔍 How to Verify

Check if Vulnerable:

Check Operations Agent version: opcagt -version or review installation logs. If version is 12.15 or between 12.20-12.25 on non-Windows OS, system is vulnerable.

Check Version:

opcagt -version

Verify Fix Applied:

Verify version after patching shows a version above 12.25 or a patched 12.15 version. Check vendor advisory for exact fixed version numbers.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Operations Agent process running with unexpected privileges
  • Authentication logs showing local user accessing elevated functions

Network Indicators:

  • Unusual outbound connections from Operations Agent systems after local user activity

SIEM Query:

source="*auth.log*" OR source="*secure*" (event_type="privilege_escalation" OR sudo OR su) AND process="*opcagt*" OR host="*operations-agent*"

🔗 References

📤 Share & Export