CVE-2024-35164

Source
https://cve.org/CVERecord?id=CVE-2024-35164
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35164.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35164
Downstream
Published
2025-07-02T12:15:27.770Z
Modified
2026-04-10T05:13:07.746029Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The terminal emulator of Apache Guacamole 1.5.5 and older does not properly validate console codes received from servers via text-based protocols like SSH. If a malicious user has access to a text-based connection, a specially-crafted sequence of console codes could allow arbitrary code to be executed with the privileges of the running guacd process.

Users are recommended to upgrade to version 1.6.0, which fixes this issue.

References

Affected packages

Git / github.com/apache/guacamole-server

Affected ranges

Type
GIT
Repo
https://github.com/apache/guacamole-server
Events
Database specific
{
    "versions": [
        {
            "introduced": "0.8.0"
        },
        {
            "fixed": "1.6.0"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35164.json"