// For flags

CVE-2016-9796

Alcatel Lucent Omnivista 8770 - Remote Code Execution

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Alcatel-Lucent OmniVista 8770 2.0 through 3.0 exposes different ORBs interfaces, which can be queried using the GIOP protocol on TCP port 30024. An attacker can bypass authentication, and OmniVista invokes methods (AddJobSet, AddJob, and ExecuteNow) that can be used to run arbitrary commands on the server, with the privilege of NT AUTHORITY\SYSTEM on the server. NOTE: The discoverer states "The vendor position is to refer to the technical guidelines of the product security deployment to mitigate this issue, which means applying proper firewall rules to prevent unauthorised clients to connect to the OmniVista server."

Alcatel-Lucent OmniVista 8770 2.0 hasta la versión 3.0 expone diferentes interfaces ORBs, las cuales se pueden consultar usando el protocolo GIOP en el TCP puerto 30024. Un atacante puede eludir la autenticación, y OmniVista recurre a métodos (AddJobSet, AddJob y ExecuteNow) que pueden ser usados para ejecutar comandos arbitrarios en el servidor, con el privilegio de NT AUTHORITY\SYSTEM en el servidor. NOTA: El descubridor afirma "La posición del proveedor es remitir a la guía técnica del desarrollo de seguridad del producto para mitigar este problema, lo que significa aplicar reglas de firewall apropiadas para prevenir que clientes no autorizados conecten con el servidor OmniVista".

Alcatel Lucent Omnivista 8770 suffers from a remote code execution vulnerability.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-12-02 CVE Reserved
  • 2016-12-03 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • 2024-09-25 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-287: Improper Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Alcatel-lucent
Search vendor "Alcatel-lucent"
Omnivista 8770 Network Management System
Search vendor "Alcatel-lucent" for product "Omnivista 8770 Network Management System"
2.0
Search vendor "Alcatel-lucent" for product "Omnivista 8770 Network Management System" and version "2.0"
-
Affected
Alcatel-lucent
Search vendor "Alcatel-lucent"
Omnivista 8770 Network Management System
Search vendor "Alcatel-lucent" for product "Omnivista 8770 Network Management System"
2.6
Search vendor "Alcatel-lucent" for product "Omnivista 8770 Network Management System" and version "2.6"
-
Affected
Alcatel-lucent
Search vendor "Alcatel-lucent"
Omnivista 8770 Network Management System
Search vendor "Alcatel-lucent" for product "Omnivista 8770 Network Management System"
3.0
Search vendor "Alcatel-lucent" for product "Omnivista 8770 Network Management System" and version "3.0"
-
Affected