CVE-2021-22504
Published Feb 12, 2021
Last updated a year ago
Overview
- Description
- Arbitrary code execution vulnerability on Micro Focus Operations Bridge Manager product, affecting versions 10.1x, 10.6x, 2018.05, 2018.11, 2019.05, 2019.11, 2020.05, 2020.10. The vulnerability could allow remote attackers to execute arbitrary code on an OBM server.
- Source
- security@opentext.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:10.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FC390D2-CF75-404F-9673-89B37DE82D09" }, { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:10.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E38A260-424C-4B73-A502-75394F64AEAE" }, { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:10.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F0B3E96-BEE7-4F04-8FB7-633C42DEBEA9" }, { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:10.60:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DEC1A77-DFF5-4E35-BD25-9ED3EEC77702" }, { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:10.61:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9328132A-CB29-4252-B0DE-32E1AE402526" }, { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:10.62:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C163191-6D2E-4403-B416-ED29174B5781" }, { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:10.63:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9C552EF-2ADA-4293-8DA6-8EFF201FD2E1" }, { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2018.05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1A2E37C-69DC-42AC-BE72-475561249F24" }, { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2018.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F169AF11-4F4D-4A17-8808-8F5E5822D17C" }, { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2019.05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65B2691B-246F-4305-943F-392062AD7C9B" }, { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2019.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFD9DF2A-E5D3-48DD-8D0A-CD2C333E5354" }, { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2020.05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F113173-2ECD-4FF6-A664-A9AABFD448CA" }, { "criteria": "cpe:2.3:a:microfocus:operations_bridge_manager:2020.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FAFEEDA-F0AB-44F3-BDB9-3413FE9C53D3" } ], "operator": "OR" } ] } ]