CA Performance Management 3.5.x, 3.6.x before 3.6.9, and 3.7.x before 3.7.4 have a default credential vulnerability that can allow a remote attacker to execute arbitrary commands and compromise system security.
References
Link | Resource |
---|---|
https://techdocs.broadcom.com/us/product-content/recommended-reading/security-notices/ca-20191015-01-security-notice-for-ca-performance-management.html | Vendor Advisory |
https://seclists.org/bugtraq/2019/Oct/26 | Issue Tracking Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/154904/CA-Performance-Management-Arbitary-Command-Execution.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/154904/CA-Performance-Management-Arbitrary-Command-Execution.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Oct/37 | Mailing List Third Party Advisory |
Configurations
Information
Published : 2019-10-17 12:15
Updated : 2019-10-24 06:58
NVD link : CVE-2019-13657
Mitre link : CVE-2019-13657
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
broadcom
- network_operations
- ca_performance_management