CVE-2015-7861
Description
Persistent Accelerite Radia Client Automation (formerly HP Client Automation), possibly before 9.1, allows remote attackers to execute arbitrary code by sending unspecified commands in an environment that lacks relationship-based firewalling.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Remote code execution in Accelerite Radia Client Automation (formerly HP) agent before 9.1 via arbitrary command injection, no authentication required.
Vulnerability
CVE-2015-7861 is a command injection vulnerability in the agent component of Accelerite Radia Client Automation (formerly HP Client Automation) prior to version 9.1 [1][2]. The flaw exists within the agent's handling of commands, allowing an attacker to send arbitrary commands without any authentication [1]. The vulnerability affects the Role-Based Access and Remote Notify features [2].
Exploitation
An unauthenticated remote attacker can exploit this vulnerability by sending specially crafted commands to the vulnerable agent over the network [1]. No user interaction or prior access is required. The attacker simply needs network connectivity to the target system running the affected agent [2].
Impact
Successful exploitation allows the attacker to execute arbitrary code with SYSTEM privileges on the target system [1][2]. This results in complete compromise of confidentiality, integrity, and availability of the affected host.
Mitigation
Accelerite released a hotfix and advisory for this issue [2]. The fix is included in Radia Client Automation version 9.1 and later [2]. Organizations should update to the latest version or apply the hotfix provided by Accelerite. If upgrading is not immediately possible, network segmentation and firewalling should be used to restrict access to the agent port from untrusted networks [1][2].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
5cpe:2.3:a:accelerite:radia_client_automation:7.9:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:accelerite:radia_client_automation:7.9:*:*:*:*:*:*:*
- cpe:2.3:a:accelerite:radia_client_automation:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:accelerite:radia_client_automation:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:accelerite:radia_client_automation:9.1:*:*:*:*:*:*:*
- Range: <9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.