This vulnerability allows local attackers to escalate privileges to root on vulnerable installations of AlienVault Unified Security Management. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the configuration of the server and database. A local attacker in the alienvault group can read the database password and schedule, as root, a custom report that can include shell commands. This vulnerability can be leveraged by a local attacker to execute arbitrary code as root.