Lucene search

K
cve[email protected]CVE-2016-3084
HistoryMay 25, 2017 - 5:29 p.m.

CVE-2016-3084

2017-05-2517:29:00
CWE-264
web.nvd.nist.gov
16
uaa
reset password
cloud foundry
vulnerability
brute force
attack
security
cve-2016-3084

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.3%

The UAA reset password flow in Cloud Foundry release v236 and earlier versions, UAA release v3.3.0 and earlier versions, all versions of Login-server, UAA release v10 and earlier versions and Pivotal Elastic Runtime versions prior to 1.7.2 is vulnerable to a brute force attack due to multiple active codes at a given time. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.

Affected configurations

NVD
Node
cloudfoundrycloud_foundry_uaa_boshRange10
OR
pivotal_softwarecloud_foundryRange236
OR
pivotal_softwarecloud_foundry_elastic_runtimeRange1.7.1
OR
pivotal_softwarecloud_foundry_uaaRange3.3.0
OR
pivotal_softwarelogin-serverMatch-

CNA Affected

[
  {
    "product": "Cloud Foundry",
    "vendor": "Pivotal",
    "versions": [
      {
        "status": "affected",
        "version": "release v236 and earlier versions"
      },
      {
        "status": "affected",
        "version": "UAA release v3.3.0 and earlier versions"
      },
      {
        "status": "affected",
        "version": "All versions of Login-server"
      },
      {
        "status": "affected",
        "version": "UAA release v10 and earlier versions"
      },
      {
        "status": "affected",
        "version": "Elastic Runtime versions prior to 1.7.2"
      }
    ]
  }
]

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.3%