CVE-2020-11631
Published Apr 8, 2020
Last updated 3 years ago
Overview
- Description
- An issue was discovered in EJBCA before 6.15.2.6 and 7.x before 7.3.1.2. An error state can be generated in the CA UI by a malicious user. This, in turn, allows exploitation of other bugs. This follow-on exploitation can lead to privilege escalation and remote code execution. (This is exploitable only when at least one accessible port lacks a requirement for client certificate authentication. These ports are 8442 or 8080 in a standard installation.)
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:primekey:ejbca:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "736F366E-25F7-4366-A522-35127922E74E", "versionEndExcluding": "6.15.2.6" }, { "criteria": "cpe:2.3:a:primekey:ejbca:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "948B0043-AAFB-48B4-A120-2683A3831AB3", "versionEndExcluding": "7.3.1.2", "versionStartIncluding": "7.0.0" } ], "operator": "OR" } ] } ]