Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-8868 |
CWE-ID | CWE-798 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Foglight Evolve Client/Desktop applications / Other client software |
Vendor | Quest Software Inc. |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU26155
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-8868
CWE-ID:
CWE-798 - Use of Hard-coded Credentials
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists within the "CommandLineService" functionality due to presence of hard-coded credentials in application code in the "__service__ user" account. A remote unauthenticated attacker can access the affected system using the hard-coded credentials for this account and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationVendor recommends to update to the following Hotfix: FMS 5.9.5 Hotfix HFIX-314.
Vulnerable software versionsFoglight Evolve: All versions
External linkshttp://www.zerodayinitiative.com/advisories/ZDI-20-290/
http://support.quest.com/foglight/kb/315091/fms-5-9-5-hotfix-hfix-314
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.