Vulnerability identifier: #VU26155
Vulnerability risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-798
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Foglight Evolve
Client/Desktop applications /
Other client software
Vendor: Quest Software Inc.
Description
The vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists within the "CommandLineService" functionality due to presence of hard-coded credentials in application code in the "__service__ user" account. A remote unauthenticated attacker can access the affected system using the hard-coded credentials for this account and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Mitigation
Vendor recommends to update to the following Hotfix: FMS 5.9.5 Hotfix HFIX-314.
Vulnerable software versions
Foglight Evolve: All versions
External links
http://www.zerodayinitiative.com/advisories/ZDI-20-290/
http://support.quest.com/foglight/kb/315091/fms-5-9-5-hotfix-hfix-314
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.