// For flags

CVE-2020-5426

Scheduler for TAS can transmit privileged UAA token in plaintext

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service. If intercepted the token can give an attacker admin level access in the cloud controller.

Scheduler for TAS anterior a versión 1.4.0, permitía la transmisión de texto plano del token de cliente UAA enviándolo a través de una conexión que no era TLS. Esto también dependía de la configuración del servidor MySQL que es usada para almacenar en caché un token de cliente UAA usado por el servicio. Si se intercepta, el token puede otorgar a un atacante acceso de nivel de administrador en el controlador de la nube

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-03 CVE Reserved
  • 2020-11-11 CVE Published
  • 2023-07-28 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-319: Cleartext Transmission of Sensitive Information
CAPEC
References (1)
URL Tag Source
https://tanzu.vmware.com/security/cve-2020-5426 Third Party Advisory
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Vmware
Search vendor "Vmware"
Pivotal Scheduler
Search vendor "Vmware" for product "Pivotal Scheduler"
< 1.4.0
Search vendor "Vmware" for product "Pivotal Scheduler" and version " < 1.4.0"
-
Affected