Lucene search

K
cvelistPivotalCVELIST:CVE-2019-11288
HistoryJan 27, 2020 - 6:50 p.m.

CVE-2019-11288 tcServer JMX Socket Listener Registry Rebinding Local Privilege Escalation

2020-01-2718:50:13
CWE-269
pivotal
www.cve.org
2

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

5.1%

In Pivotal tc Server, 3.x versions prior to 3.2.19 and 4.x versions prior to 4.0.10, and Pivotal tc Runtimes, 7.x versions prior to 7.0.99.B, 8.x versions prior to 8.5.47.A, and 9.x versions prior to 9.0.27.A, when a tc Runtime instance is configured with the JMX Socket Listener, a local attacker without access to the tc Runtime process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the tc Runtime instance.

CNA Affected

[
  {
    "product": "Pivotal tc Server 4.x",
    "vendor": "Pivotal",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "All",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Pivotal tc Server 3.x",
    "vendor": "Pivotal",
    "versions": [
      {
        "lessThan": "3.2.19",
        "status": "affected",
        "version": "All",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Pivotal tc Server 4.x Runtimes",
    "vendor": "Pivotal",
    "versions": [
      {
        "lessThan": "7.0.99.B",
        "status": "affected",
        "version": "7.x",
        "versionType": "custom"
      },
      {
        "lessThan": "8.5.47.A",
        "status": "affected",
        "version": "8.x",
        "versionType": "custom"
      },
      {
        "lessThan": "9.0.27.A",
        "status": "affected",
        "version": "9.x",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Pivotal tc Server 3.x Runtimes",
    "vendor": "Pivotal",
    "versions": [
      {
        "lessThan": "7.0.99.B",
        "status": "affected",
        "version": "7.x",
        "versionType": "custom"
      },
      {
        "lessThan": "8.5.47.A",
        "status": "affected",
        "version": "8.x",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

5.1%

Related for CVELIST:CVE-2019-11288