Vulnerability CVE-2019-7727


Published: 2019-04-23

Description:
In NICE Engage through 6.5, the default configuration binds an unauthenticated JMX/RMI interface to all network interfaces, without restricting registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol by using the JMX connector. The observed affected TCP port is 6338 but, based on the product's configuration, a different one could be vulnerable.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
NICE -> Engage 

 References:
http://seclists.org/fulldisclosure/2019/Apr/4
https://redtimmysec.wordpress.com/2019/03/26/jmx-rmi-multiple-applications-rce/
https://seclists.org/bugtraq/2019/Apr/2

Copyright 2024, cxsecurity.com

 

Back to Top