In NICE Engage through 6.5, the default configuration binds an unauthenticated JMX/RMI interface to all network interfaces, without restricting registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol by using the JMX connector. The observed affected TCP port is 6338 but, based on the product's configuration, a different one could be vulnerable.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2019/Apr/4 | Mailing List Third Party Advisory |
https://redtimmysec.wordpress.com/2019/03/26/jmx-rmi-multiple-applications-rce/ | Mitigation Third Party Advisory |
https://seclists.org/bugtraq/2019/Apr/2 | Mailing List Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-04-23T19:07:51
Updated: 2019-04-23T19:07:51
Reserved: 2019-02-11T00:00:00
Link: CVE-2019-7727
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-04-23T20:32:46.177
Modified: 2020-08-24T17:37:01.140
Link: CVE-2019-7727
JSON object: View
Redhat Information
No data.
CWE