CVE-2020-11858 (GCVE-0-2020-11858)

Vulnerability from cvelistv5 – Published: 2020-10-27 16:45 – Updated: 2024-08-04 11:42
VLAI?
Summary
Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. The vulnerability could allow local attackers to execute code with escalated privileges.
CWE
  • Code execution with escalated privileges
Assigner
Impacted products
Vendor Product Version
Micro Focus Operation Bridge (containerized) Affected: 2020.05
Affected: 2019.08
Affected: 2019.05
Affected: 2018.11
Affected: 2018.08
Affected: 2018.05
Affected: 2018.02
Affected: 2017.11
Create a notification for this product.
    Micro Focus Operation Bridge Manager Affected: 2020.05
Affected: 2019.11
Affected: 2019.05
Affected: 2018.11
Affected: 2018.05
Affected: 10.63
Affected: 10.62
Affected: 10.61
Affected: 10.60
Affected: 10.12
Affected: 10.11
Affected: unspecified , ≤ 10.10 (custom)
Create a notification for this product.
Credits
Micro Focus would like to thank Pedro Ribeiro from Agile Information Security working with Trend Micro Zero Day Initiative for discovering and reporting the vulnerability
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:42:00.534Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://softwaresupport.softwaregrp.com/doc/KM03747658"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://softwaresupport.softwaregrp.com/doc/KM03747854"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1326/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Operation Bridge (containerized)",
          "vendor": "Micro Focus ",
          "versions": [
            {
              "status": "affected",
              "version": "2020.05"
            },
            {
              "status": "affected",
              "version": "2019.08"
            },
            {
              "status": "affected",
              "version": "2019.05"
            },
            {
              "status": "affected",
              "version": "2018.11"
            },
            {
              "status": "affected",
              "version": "2018.08"
            },
            {
              "status": "affected",
              "version": "2018.05"
            },
            {
              "status": "affected",
              "version": "2018.02"
            },
            {
              "status": "affected",
              "version": "2017.11"
            }
          ]
        },
        {
          "product": "Operation Bridge Manager",
          "vendor": "Micro Focus ",
          "versions": [
            {
              "status": "affected",
              "version": "2020.05"
            },
            {
              "status": "affected",
              "version": "2019.11"
            },
            {
              "status": "affected",
              "version": "2019.05"
            },
            {
              "status": "affected",
              "version": "2018.11"
            },
            {
              "status": "affected",
              "version": "2018.05"
            },
            {
              "status": "affected",
              "version": "10.63"
            },
            {
              "status": "affected",
              "version": "10.62"
            },
            {
              "status": "affected",
              "version": "10.61"
            },
            {
              "status": "affected",
              "version": "10.60"
            },
            {
              "status": "affected",
              "version": "10.12"
            },
            {
              "status": "affected",
              "version": "10.11"
            },
            {
              "lessThanOrEqual": "10.10",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Micro Focus would like to thank Pedro Ribeiro from Agile Information Security working with Trend Micro Zero Day Initiative for discovering and reporting the vulnerability"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. The vulnerability could allow local attackers to execute code with escalated privileges."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "Code execution with escalated privileges."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Code execution with escalated privileges",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-15T17:06:10",
        "orgId": "f81092c5-7f14-476d-80dc-24857f90be84",
        "shortName": "microfocus"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://softwaresupport.softwaregrp.com/doc/KM03747658"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://softwaresupport.softwaregrp.com/doc/KM03747854"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1326/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "For Operation Bridge Manager https://softwaresupport.softwaregrp.com/doc/KM03747658\nFor Operation Bridge (containerized) https://softwaresupport.softwaregrp.com/doc/KM03747854\n"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Code execution with escalated privilegesn vlnerability in Operation bridge Manager and Operations Bridge (containerized) products.",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@microfocus.com",
          "ID": "CVE-2020-11858",
          "STATE": "PUBLIC",
          "TITLE": "Code execution with escalated privilegesn vlnerability in Operation bridge Manager and Operations Bridge (containerized) products."
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Operation Bridge (containerized)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2020.05"
                          },
                          {
                            "version_value": "2019.08"
                          },
                          {
                            "version_value": "2019.05"
                          },
                          {
                            "version_value": "2018.11"
                          },
                          {
                            "version_value": "2018.08"
                          },
                          {
                            "version_value": "2018.05"
                          },
                          {
                            "version_value": "2018.02"
                          },
                          {
                            "version_value": "2017.11"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Operation Bridge Manager",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "2020.05"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2019.11"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2019.05"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2018.11"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "2018.05"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.63"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.62"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.61"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.60"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.12"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.11"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "10.10"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Micro Focus "
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Micro Focus would like to thank Pedro Ribeiro from Agile Information Security working with Trend Micro Zero Day Initiative for discovering and reporting the vulnerability"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. The vulnerability could allow local attackers to execute code with escalated privileges."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "Code execution with escalated privileges."
          }
        ],
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Code execution with escalated privileges"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://softwaresupport.softwaregrp.com/doc/KM03747658",
              "refsource": "MISC",
              "url": "https://softwaresupport.softwaregrp.com/doc/KM03747658"
            },
            {
              "name": "https://softwaresupport.softwaregrp.com/doc/KM03747854",
              "refsource": "MISC",
              "url": "https://softwaresupport.softwaregrp.com/doc/KM03747854"
            },
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1326/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1326/"
            },
            {
              "name": "http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "For Operation Bridge Manager https://softwaresupport.softwaregrp.com/doc/KM03747658\nFor Operation Bridge (containerized) https://softwaresupport.softwaregrp.com/doc/KM03747854\n"
          }
        ],
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84",
    "assignerShortName": "microfocus",
    "cveId": "CVE-2020-11858",
    "datePublished": "2020-10-27T16:45:12",
    "dateReserved": "2020-04-16T00:00:00",
    "dateUpdated": "2024-08-04T11:42:00.534Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2017.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22CE2A4E-D42B-47F7-BFC1-EA498795D0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2018.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88D1F756-6699-4046-AC9F-FED971A26B9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2018.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68B8CDAA-33CF-4B9D-954B-1976160A1A76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2018.08:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C945B57-F9CB-4282-9D0E-F552B8AD1AC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2018.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7939DB7E-484A-477F-A303-BD5B1EF9BD4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2019.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6212937A-A038-41B6-929E-F8A1C2DB41A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2019.08:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A28436C6-6A21-4A1D-A1E0-C4F224DB669A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2020.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7F4EB07-6B54-4EB1-9C47-7D42BADA6C6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"10.10\", \"matchCriteriaId\": \"95F47B66-7FAD-44C9-9C8C-8DD785F4B297\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:10.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E38A260-424C-4B73-A502-75394F64AEAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:10.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F0B3E96-BEE7-4F04-8FB7-633C42DEBEA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:10.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DEC1A77-DFF5-4E35-BD25-9ED3EEC77702\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:10.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9328132A-CB29-4252-B0DE-32E1AE402526\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:10.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C163191-6D2E-4403-B416-ED29174B5781\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:10.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9C552EF-2ADA-4293-8DA6-8EFF201FD2E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:2018.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1A2E37C-69DC-42AC-BE72-475561249F24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:2018.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F169AF11-4F4D-4A17-8808-8F5E5822D17C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:2019.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65B2691B-246F-4305-943F-392062AD7C9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:2019.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFD9DF2A-E5D3-48DD-8D0A-CD2C333E5354\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:2020.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F113173-2ECD-4FF6-A664-A9AABFD448CA\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. The vulnerability could allow local attackers to execute code with escalated privileges.\"}, {\"lang\": \"es\", \"value\": \"Una ejecuci\\u00f3n de c\\u00f3digo con una vulnerabilidad de privilegios escalados en los productos Micro Focus Operation Bridge Manager y Operation Bridge (en contenedores).\u0026#xa0;La vulnerabilidad afecta: 1.) Operation Bridge Manager versiones: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 y todas las versiones anteriores.\u0026#xa0;2.) Operations Bridge (en contenedores) versiones: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05.\u0026#xa0;2018.02 y 2017.11.\u0026#xa0;La vulnerabilidad podr\\u00eda permitir a atacantes locales ejecutar c\\u00f3digo con privilegios escalados\"}]",
      "id": "CVE-2020-11858",
      "lastModified": "2024-11-21T04:58:46.137",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@opentext.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2020-10-27T17:15:12.273",
      "references": "[{\"url\": \"http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html\", \"source\": \"security@opentext.com\"}, {\"url\": \"https://softwaresupport.softwaregrp.com/doc/KM03747658\", \"source\": \"security@opentext.com\"}, {\"url\": \"https://softwaresupport.softwaregrp.com/doc/KM03747854\", \"source\": \"security@opentext.com\"}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-1326/\", \"source\": \"security@opentext.com\"}, {\"url\": \"http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://softwaresupport.softwaregrp.com/doc/KM03747658\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://softwaresupport.softwaregrp.com/doc/KM03747854\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-1326/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "security@opentext.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-11858\",\"sourceIdentifier\":\"security@opentext.com\",\"published\":\"2020-10-27T17:15:12.273\",\"lastModified\":\"2024-11-21T04:58:46.137\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. The vulnerability could allow local attackers to execute code with escalated privileges.\"},{\"lang\":\"es\",\"value\":\"Una ejecuci\u00f3n de c\u00f3digo con una vulnerabilidad de privilegios escalados en los productos Micro Focus Operation Bridge Manager y Operation Bridge (en contenedores).\u0026#xa0;La vulnerabilidad afecta: 1.) Operation Bridge Manager versiones: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 y todas las versiones anteriores.\u0026#xa0;2.) Operations Bridge (en contenedores) versiones: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05.\u0026#xa0;2018.02 y 2017.11.\u0026#xa0;La vulnerabilidad podr\u00eda permitir a atacantes locales ejecutar c\u00f3digo con privilegios escalados\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@opentext.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2017.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22CE2A4E-D42B-47F7-BFC1-EA498795D0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2018.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D1F756-6699-4046-AC9F-FED971A26B9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2018.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68B8CDAA-33CF-4B9D-954B-1976160A1A76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2018.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C945B57-F9CB-4282-9D0E-F552B8AD1AC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2018.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7939DB7E-484A-477F-A303-BD5B1EF9BD4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2019.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6212937A-A038-41B6-929E-F8A1C2DB41A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2019.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A28436C6-6A21-4A1D-A1E0-C4F224DB669A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2020.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7F4EB07-6B54-4EB1-9C47-7D42BADA6C6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.10\",\"matchCriteriaId\":\"95F47B66-7FAD-44C9-9C8C-8DD785F4B297\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:10.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E38A260-424C-4B73-A502-75394F64AEAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:10.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0B3E96-BEE7-4F04-8FB7-633C42DEBEA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:10.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DEC1A77-DFF5-4E35-BD25-9ED3EEC77702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:10.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9328132A-CB29-4252-B0DE-32E1AE402526\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:10.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C163191-6D2E-4403-B416-ED29174B5781\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:10.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C552EF-2ADA-4293-8DA6-8EFF201FD2E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:2018.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2E37C-69DC-42AC-BE72-475561249F24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:2018.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F169AF11-4F4D-4A17-8808-8F5E5822D17C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:2019.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65B2691B-246F-4305-943F-392062AD7C9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:2019.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFD9DF2A-E5D3-48DD-8D0A-CD2C333E5354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:2020.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F113173-2ECD-4FF6-A664-A9AABFD448CA\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html\",\"source\":\"security@opentext.com\"},{\"url\":\"https://softwaresupport.softwaregrp.com/doc/KM03747658\",\"source\":\"security@opentext.com\"},{\"url\":\"https://softwaresupport.softwaregrp.com/doc/KM03747854\",\"source\":\"security@opentext.com\"},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-20-1326/\",\"source\":\"security@opentext.com\"},{\"url\":\"http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://softwaresupport.softwaregrp.com/doc/KM03747658\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://softwaresupport.softwaregrp.com/doc/KM03747854\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-20-1326/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…