VYPR
Unrated severityNVD Advisory· Published Oct 19, 2015· Updated May 6, 2026

CVE-2015-7861

CVE-2015-7861

Description

Persistent Accelerite Radia Client Automation (formerly HP Client Automation), possibly before 9.1, allows remote attackers to execute arbitrary code by sending unspecified commands in an environment that lacks relationship-based firewalling.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Remote code execution in Accelerite Radia Client Automation (formerly HP) agent before 9.1 via arbitrary command injection, no authentication required.

Vulnerability

CVE-2015-7861 is a command injection vulnerability in the agent component of Accelerite Radia Client Automation (formerly HP Client Automation) prior to version 9.1 [1][2]. The flaw exists within the agent's handling of commands, allowing an attacker to send arbitrary commands without any authentication [1]. The vulnerability affects the Role-Based Access and Remote Notify features [2].

Exploitation

An unauthenticated remote attacker can exploit this vulnerability by sending specially crafted commands to the vulnerable agent over the network [1]. No user interaction or prior access is required. The attacker simply needs network connectivity to the target system running the affected agent [2].

Impact

Successful exploitation allows the attacker to execute arbitrary code with SYSTEM privileges on the target system [1][2]. This results in complete compromise of confidentiality, integrity, and availability of the affected host.

Mitigation

Accelerite released a hotfix and advisory for this issue [2]. The fix is included in Radia Client Automation version 9.1 and later [2]. Organizations should update to the latest version or apply the hotfix provided by Accelerite. If upgrading is not immediately possible, network segmentation and firewalling should be used to restrict access to the agent port from untrusted networks [1][2].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

5
  • cpe:2.3:a:accelerite:radia_client_automation:7.9:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:accelerite:radia_client_automation:7.9:*:*:*:*:*:*:*
    • cpe:2.3:a:accelerite:radia_client_automation:8.1:*:*:*:*:*:*:*
    • cpe:2.3:a:accelerite:radia_client_automation:9.0:*:*:*:*:*:*:*
    • cpe:2.3:a:accelerite:radia_client_automation:9.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.