Lucene search

K
cve[email protected]CVE-2019-11288
HistoryJan 27, 2020 - 7:15 p.m.

CVE-2019-11288

2020-01-2719:15:10
CWE-269
web.nvd.nist.gov
23
pivotal
tc server
tc runtimes
cve-2019-11288
mitm
jmx
security
vulnerability

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

In Pivotal tc Server, 3.x versions prior to 3.2.19 and 4.x versions prior to 4.0.10, and Pivotal tc Runtimes, 7.x versions prior to 7.0.99.B, 8.x versions prior to 8.5.47.A, and 9.x versions prior to 9.0.27.A, when a tc Runtime instance is configured with the JMX Socket Listener, a local attacker without access to the tc Runtime process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the tc Runtime instance.

Affected configurations

NVD
Node
pivotaltc_runtimesRange7.0.70.b7.0.99.b
OR
pivotaltc_runtimesRange8.5.4.b8.5.47.a
OR
pivotaltc_runtimesRange9.0.6.b9.0.27.a
OR
pivotaltc_serverRange3.0.03.2.19
OR
pivotaltc_serverRange4.0.04.0.10

CNA Affected

[
  {
    "product": "Pivotal tc Server 4.x",
    "vendor": "Pivotal",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "All",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Pivotal tc Server 3.x",
    "vendor": "Pivotal",
    "versions": [
      {
        "lessThan": "3.2.19",
        "status": "affected",
        "version": "All",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Pivotal tc Server 4.x Runtimes",
    "vendor": "Pivotal",
    "versions": [
      {
        "lessThan": "7.0.99.B",
        "status": "affected",
        "version": "7.x",
        "versionType": "custom"
      },
      {
        "lessThan": "8.5.47.A",
        "status": "affected",
        "version": "8.x",
        "versionType": "custom"
      },
      {
        "lessThan": "9.0.27.A",
        "status": "affected",
        "version": "9.x",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Pivotal tc Server 3.x Runtimes",
    "vendor": "Pivotal",
    "versions": [
      {
        "lessThan": "7.0.99.B",
        "status": "affected",
        "version": "7.x",
        "versionType": "custom"
      },
      {
        "lessThan": "8.5.47.A",
        "status": "affected",
        "version": "8.x",
        "versionType": "custom"
      }
    ]
  }
]

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2019-11288