ID CVE-2014-6140
Summary IBM Tivoli Endpoint Manager Mobile Device Management (MDM) before 9.0.60100 uses the same secret HMAC token across different customers' installations, which allows remote attackers to execute arbitrary code via crafted marshalled Ruby objects in cookies to (1) Enrollment and Apple iOS Management Extender, (2) Self-service portal, (3) Trusted Services provider, or (4) Admin Portal.
References
Vulnerable Configurations
  • cpe:2.3:a:ibm:tivoli_endpoint_manager_mobile_device_management:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:tivoli_endpoint_manager_mobile_device_management:9.0:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 09-10-2018 - 19:50)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
refmap via4
bid 71424
bugtraq 20141202 [RT-SA-2014-012] Unauthenticated Remote Code Execution in IBM Endpoint Manager Mobile Device Management Components
confirm http://www-01.ibm.com/support/docview.wss?uid=swg21691701
fulldisc 20141202 [RT-SA-2014-012] Unauthenticated Remote Code Execution in IBM Endpoint Manager Mobile Device Management Components
misc
sectrack 1031306
Last major update 09-10-2018 - 19:50
Published 06-12-2014 - 15:59
Last modified 09-10-2018 - 19:50
Back to Top