CVE-2024-52869
📋 TL;DR
This CVE describes a privilege escalation vulnerability in Teradata Database systems during OS migration from SLES 12 SP2/3 to SLES 15 SP2. User accounts are incorrectly assigned to groups with higher privileges than intended, potentially allowing unauthorized system access. Affected users include those running Teradata Database on SUSE Enterprise Linux Server with specific migration scenarios.
💻 Affected Systems
- Teradata Database
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise through privilege escalation of service/system accounts, potentially leading to complete data exposure, system takeover, and lateral movement within the environment.
Likely Case
Unauthorized access to sensitive data and system resources through misconfigured user accounts, with potential for data exfiltration or system manipulation.
If Mitigated
Limited impact with proper access controls and monitoring, potentially only affecting non-critical accounts or being detected before exploitation.
🎯 Exploit Status
Exploitation requires existing access to affected systems and knowledge of the misconfigured group assignments.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 2024-11-04
Vendor Advisory: https://www.teradata.com/trust-security-center/data-security
Restart Required: Yes
Instructions:
1. Apply latest Teradata updates post-2024-11-04. 2. Review and correct group assignments for all user accounts. 3. Restart affected services. 4. Verify proper group configurations.
🔧 Temporary Workarounds
Manual Group Assignment Review
linuxManually review and correct group memberships for all user accounts on affected systems
getent group
id <username>
usermod -G <correct_groups> <username>
🧯 If You Can't Patch
- Implement strict access controls and monitoring for all user accounts on affected systems
- Regularly audit group memberships and user privileges to detect unauthorized changes
🔍 How to Verify
Check if Vulnerable:
Check if system underwent SLES 12 SP2/3 to SLES 15 SP2 migration and review group memberships for service/system accounts using 'id <username>' and 'getent group' commands.
Check Version:
tdat version or check Teradata release documentation
Verify Fix Applied:
Verify all user accounts have correct group assignments and no unauthorized privilege escalation exists. Check Teradata version is post-2024-11-04.
📡 Detection & Monitoring
Log Indicators:
- Unexpected privilege escalation events
- Unauthorized access attempts using service accounts
- Changes to group memberships in system logs
Network Indicators:
- Unusual database access patterns from service accounts
- Lateral movement attempts from Teradata systems
SIEM Query:
source="teradata_logs" AND (event_type="privilege_escalation" OR user_group_change="true")