CVE-2020-5426
Scheduler for TAS can transmit privileged UAA token in plaintext
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service. If intercepted the token can give an attacker admin level access in the cloud controller.
Scheduler for TAS anterior a versión 1.4.0, permitía la transmisión de texto plano del token de cliente UAA enviándolo a través de una conexión que no era TLS. Esto también dependía de la configuración del servidor MySQL que es usada para almacenar en caché un token de cliente UAA usado por el servicio. Si se intercepta, el token puede otorgar a un atacante acceso de nivel de administrador en el controlador de la nube
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-03 CVE Reserved
- 2020-11-11 CVE Published
- 2023-07-28 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-319: Cleartext Transmission of Sensitive Information
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://tanzu.vmware.com/security/cve-2020-5426 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Pivotal Scheduler Search vendor "Vmware" for product "Pivotal Scheduler" | < 1.4.0 Search vendor "Vmware" for product "Pivotal Scheduler" and version " < 1.4.0" | - |
Affected
|