github.com/teslamotors/vehicle-command is vulnerable to Execution with Unnecessary Privileges
20
Low Risk
Affected versions of this package allow containers to run without the no-new-privileges:true security control, which may enable privilege escalation within the container environment. An attacker who gains code execution inside the container could exploit setuid/setgid binaries or misconfigured capabilities to obtain elevated privileges, potentially accessing sensitive resources or affecting the host system depending on container isolation and runtime configuration. This security hardening prevents processes from gaining additional privileges beyond their initial execution context.
You are affected if you are using a version that falls within the vulnerable range.
github.com/teslamotors/vehicle-command is vulnerable to Execution with Unnecessary Privileges in versions 0.1.0 - 0.4.0.
Upgrade the github.com/teslamotors/vehicle-command library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant