Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:anolis:sysak:*:*:*:*:*:*:*:* |
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary Command Execution via 'aaa' Function in SysAK |
Mon, 23 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anolis
Anolis sysak |
|
| Vendors & Products |
Anolis
Anolis sysak |
Fri, 20 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SysAK v2.0 and before is vulnerable to command execution via aaa;cat /etc/passwd. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-23T13:06:41.467Z
Reserved: 2024-08-21T00:00:00.000Z
Link: CVE-2024-44722
Updated: 2026-03-23T13:06:32.284Z
Status : Analyzed
Published: 2026-03-20T14:16:13.373
Modified: 2026-04-14T20:48:22.810
Link: CVE-2024-44722
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:10:27Z