Norman Security Suite up to 10.1 Authorization access control
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.2 | $0-$5k | 0.00 |
Summary
A vulnerability classified as critical was found in Norman Security Suite up to 10.1. Affected is an unknown function of the component Authorization Handler. Such manipulation leads to access control. This vulnerability is uniquely identified as CVE-2014-0816. No exploit exists. Upgrading the affected component is advised.
Details
A vulnerability was found in Norman Security Suite up to 10.1. It has been rated as critical. Affected by this issue is an unknown function of the component Authorization Handler. The manipulation with an unknown input leads to a access control vulnerability. Using CWE to declare the problem leads to CWE-264. Impacted is confidentiality, integrity, and availability. CVE summarizes:
Unspecified vulnerability in Norman Security Suite 10.1 and earlier allows local users to gain privileges via unknown vectors.
The weakness was disclosed 02/26/2014 by Satoshi Tanda as JVNDB-2014-000026 as confirmed posting (Website). The advisory is shared for download at jvn.jp. This vulnerability is handled as CVE-2014-0816 since 01/06/2014. The exploitation is known to be easy. The attack needs to be approached locally. No form of authentication is required for exploitation. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1068.
The commercial vulnerability scanner Qualys is able to test this issue with plugin 121820 (Norman Security Suite Local Privilege Escalation Vulnerability).
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (91644), SecurityFocus (BID 65806†), Secunia (SA57135†) and Vulnerability Center (SBV-43747†). Once again VulDB remains the best source for vulnerability data.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.9VulDB Meta Temp Score: 5.2
VulDB Base Score: 5.9
VulDB Temp Score: 5.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
01/06/2014 🔍02/26/2014 🔍
02/26/2014 🔍
02/26/2014 🔍
02/26/2014 🔍
02/27/2014 🔍
03/13/2014 🔍
03/26/2014 🔍
04/12/2025 🔍
Sources
Advisory: JVNDB-2014-000026Researcher: Satoshi Tanda
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-0816 (🔍)
GCVE (CVE): GCVE-0-2014-0816
GCVE (VulDB): GCVE-100-12572
X-Force: 91644 - Norman Security Suite unspecified priviliege escalation, Medium Risk
SecurityFocus: 65806 - Norman Security Suite CVE-2014-0816 Local Privilege Escalation Vulnerability
Secunia: 57135 - Norman Security Suite / Norman Security Suite Pro Unspecified Privilege Escalation Vulnera, Less Critical
Vulnerability Center: 43747 - Norman Security Suite <=10.1 Local Privilege Escalation Vulnerability, High
Entry
Created: 03/13/2014 12:33Updated: 04/12/2025 16:30
Changes: 03/13/2014 12:33 (43), 05/24/2017 09:17 (26), 12/21/2024 05:26 (18), 04/12/2025 16:30 (1)
Complete: 🔍
Committer: olku
Cache ID: 216:BAA:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.