CVE-2024-52869

6.0 MEDIUM

📋 TL;DR

This CVE describes a privilege escalation vulnerability in Teradata Database systems during OS migration from SLES 12 SP2/3 to SLES 15 SP2. User accounts are incorrectly assigned to groups with higher privileges than intended, potentially allowing unauthorized system access. Affected users include those running Teradata Database on SUSE Enterprise Linux Server with specific migration scenarios.

💻 Affected Systems

Products:
  • Teradata Database
Versions: All versions through 2024-11-04
Operating Systems: SUSE Enterprise Linux Server
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems that underwent OS migration from SLES 12 SP2 or SP3 to SLES 15 SP2. Fresh installations are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through privilege escalation of service/system accounts, potentially leading to complete data exposure, system takeover, and lateral movement within the environment.

🟠

Likely Case

Unauthorized access to sensitive data and system resources through misconfigured user accounts, with potential for data exfiltration or system manipulation.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, potentially only affecting non-critical accounts or being detected before exploitation.

🌐 Internet-Facing: LOW - This vulnerability requires specific OS migration scenarios and local access to Teradata systems, making internet-facing exploitation unlikely.
🏢 Internal Only: HIGH - Internal attackers with access to affected systems could exploit this to escalate privileges and compromise critical database infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Exploitation requires local access but involves checking and manipulating group memberships, which is straightforward for knowledgeable attackers.

Exploitation requires existing access to affected systems and knowledge of the misconfigured group assignments.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2024-11-04

Vendor Advisory: https://www.teradata.com/trust-security-center/data-security

Restart Required: Yes

Instructions:

1. Apply latest Teradata updates post-2024-11-04. 2. Review and correct group assignments for all user accounts. 3. Restart affected services. 4. Verify proper group configurations.

🔧 Temporary Workarounds

Manual Group Assignment Review

linux

Manually review and correct group memberships for all user accounts on affected systems

getent group
id <username>
usermod -G <correct_groups> <username>

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for all user accounts on affected systems
  • Regularly audit group memberships and user privileges to detect unauthorized changes

🔍 How to Verify

Check if Vulnerable:

Check if system underwent SLES 12 SP2/3 to SLES 15 SP2 migration and review group memberships for service/system accounts using 'id <username>' and 'getent group' commands.

Check Version:

tdat version or check Teradata release documentation

Verify Fix Applied:

Verify all user accounts have correct group assignments and no unauthorized privilege escalation exists. Check Teradata version is post-2024-11-04.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized access attempts using service accounts
  • Changes to group memberships in system logs

Network Indicators:

  • Unusual database access patterns from service accounts
  • Lateral movement attempts from Teradata systems

SIEM Query:

source="teradata_logs" AND (event_type="privilege_escalation" OR user_group_change="true")

🔗 References

📤 Share & Export