Lucene search

K
cve[email protected]CVE-2020-5414
HistoryJul 31, 2020 - 8:15 p.m.

CVE-2020-5414

2020-07-3120:15:13
CWE-532
CWE-200
web.nvd.nist.gov
19
cve-2020-5414
vmware
tanzu
application service
vms
app autoscaler
security vulnerability
sensitive credentials
nvd

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

5.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.0%

VMware Tanzu Application Service for VMs (2.7.x versions prior to 2.7.19, 2.8.x versions prior to 2.8.13, and 2.9.x versions prior to 2.9.7) contains an App Autoscaler that logs the UAA admin password. This credential is redacted on VMware Tanzu Operations Manager; however, the unredacted logs are available to authenticated users of the BOSH Director. This credential would grant administrative privileges to a malicious user. The same versions of App Autoscaler also log the App Autoscaler Broker password. Prior to newer versions of Operations Manager, this credential was not redacted from logs. This credential allows a malicious user to create, delete, and modify App Autoscaler services instances. Operations Manager started redacting this credential from logs as of its versions 2.7.15, 2.8.6, and 2.9.1. Note that these logs are typically only visible to foundation administrators and operators.

Affected configurations

NVD
Node
vmwaretanzu_application_service_for_virtual_machinesRange2.7.02.7.19
OR
vmwaretanzu_application_service_for_virtual_machinesRange2.8.02.8.13
OR
vmwaretanzu_application_service_for_virtual_machinesRange2.9.02.9.7
Node
vmwareoperations_managerRange2.7.02.7.15
OR
vmwareoperations_managerRange2.8.02.8.6
OR
vmwareoperations_managerRange2.9.02.9.1

CNA Affected

[
  {
    "product": "PCF Autoscaling",
    "vendor": "VMware Tanzu",
    "versions": [
      {
        "lessThan": "v232",
        "status": "affected",
        "version": "All",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Operations Manager",
    "vendor": "VMware Tanzu",
    "versions": [
      {
        "lessThan": "2.7.15",
        "status": "affected",
        "version": "2.7",
        "versionType": "custom"
      },
      {
        "lessThan": "2.8.6",
        "status": "affected",
        "version": "2.8",
        "versionType": "custom"
      },
      {
        "lessThan": "2.9.1",
        "status": "affected",
        "version": "2.9",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "VMware Tanzu Application Service for VMs",
    "vendor": "VMware Tanzu",
    "versions": [
      {
        "lessThan": "2.9.7",
        "status": "affected",
        "version": "2.9.x",
        "versionType": "custom"
      },
      {
        "lessThan": "2.7.19",
        "status": "affected",
        "version": "2.7.x",
        "versionType": "custom"
      },
      {
        "lessThan": "2.8.13",
        "status": "affected",
        "version": "2.8.x",
        "versionType": "custom"
      }
    ]
  }
]

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

5.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.0%

Related for CVE-2020-5414