#VU26155 Use of hard-coded credentials in Foglight Evolve


Published: 2020-03-18

Vulnerability identifier: #VU26155

Vulnerability risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-8868

CWE-ID: CWE-798

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Foglight Evolve
Client/Desktop applications / Other client software

Vendor: Quest Software Inc.

Description

The vulnerability allows a remote attacker to gain full access to vulnerable system.

The vulnerability exists within the "CommandLineService" functionality due to presence of hard-coded credentials in application code in the "__service__ user" account. A remote unauthenticated attacker can access the affected system using the hard-coded credentials for this account and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation
Vendor recommends to update to the following Hotfix: FMS 5.9.5 Hotfix HFIX-314.

Vulnerable software versions

Foglight Evolve: All versions


External links
http://www.zerodayinitiative.com/advisories/ZDI-20-290/
http://support.quest.com/foglight/kb/315091/fms-5-9-5-hotfix-hfix-314


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability