IBM Tivoli Endpoint Manager Mobile Device Management (MDM) before 9.0.60100 uses the same secret HMAC token across different customers' installations, which allows remote attackers to execute arbitrary code via crafted marshalled Ruby objects in cookies to (1) Enrollment and Apple iOS Management Extender, (2) Self-service portal, (3) Trusted Services provider, or (4) Admin Portal.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/129349/IBM-Endpoint-Manager-For-Mobile-Devices-Code-Execution.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Dec/3 - Exploit | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21691701 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/534131/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/71424 - | |
References | () http://www.securitytracker.com/id/1031306 - | |
References | () https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-012/-unauthenticated-remote-code-execution-in-ibm-endpoint-manager-mobile-device-management-components - Exploit |
Information
Published : 2014-12-06 15:59
Updated : 2024-11-21 02:13
NVD link : CVE-2014-6140
Mitre link : CVE-2014-6140
CVE.ORG link : CVE-2014-6140
JSON object : View
Products Affected
ibm
- tivoli_endpoint_manager_mobile_device_management
CWE
CWE-310
Cryptographic Issues