4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
6.8 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
Original release date: March 23,2021
Last revised:
CVE-2021-28822
Source: TIBCO Software Inc.
Products Affected
TIBCO Enterprise Message Service versions 8.5.1 and below
TIBCO Enterprise Message Service - Community Edition versions 8.5.1 and
below
TIBCO Enterprise Message Service - Developer Edition versions 8.5.1 and
below
The following components are affected:
Description
The components listed above contain a vulnerability that theoretically allows
a low privileged attacker with local access on the Windows operating system to
insert malicious software. The affected component can be abused to execute the
malicious software inserted by the attacker with the elevated privileges of
the component. This vulnerability results from the affected component
searching for run-time artifacts outside of the installation hierarchy.
Impact
The impact of this vulnerability includes the possibility of an attacker
gaining full access to the Windows operating system at the privilege level of
the affected component.
CVSS v3 Base Score: 8.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)
Solution
TIBCO has released updated versions of the affected systems which address this
issue:
TIBCO Enterprise Message Service versions 8.5.1 and below update to version
8.6.0 or higher
TIBCO Enterprise Message Service - Community Edition versions 8.5.1 and
below update to version 8.6.0 or higher
TIBCO Enterprise Message Service - Developer Edition versions 8.5.1 and
below update to version 8.6.0 or higher
Acknowledgments
TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for
discovery of this vulnerability.
References
http://www.tibco.com/services/support/advisories
CVE-2021-28822
The information on this page is being provided to you on an “AS IS” and “AS-AVAILABLE” basis. The issues described on this page mayor may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUTNOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of yourlicense and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms ofUse, and may be used only for the purposes contemplated by such Terms ofUse.
4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
6.8 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%