Vulnerability Details : CVE-2011-1655
The management.asmx module in the Management Web Service in the Unified Network Control (UNC) Server in CA Total Defense (TD) r12 before SE2 sends a cleartext response to unspecified getDBConfigSettings requests, which makes it easier for remote attackers to obtain database credentials, and subsequently execute arbitrary code, by sniffing the network, related to the UNCWS Web Service.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2011-1655
Probability of exploitation activity in the next 30 days: 96.34%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-1655
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2011-1655
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1655
-
http://www.securityfocus.com/archive/1/517492/100/0/threaded
SecurityFocus
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/66727
CA Total Defense UNCSW code execution CVE-2011-1655 Vulnerability Report
-
http://www.securityfocus.com/archive/1/517494/100/0/threaded
SecurityFocus
-
http://securitytracker.com/id?1025353
CA Total Defense Input Validation Flaw Lets Remote Users Inject SQL Commands - SecurityTracker
-
http://www.vupen.com/english/advisories/2011/0977
Webmail | OVH- OVHVendor Advisory
-
http://www.zerodayinitiative.com/advisories/ZDI-11-127/
ZDI-11-127 | Zero Day Initiative
-
http://www.securityfocus.com/bid/47356
Computer Associates Total Defense 'UNCSW' Service Remote Code Execution Vulnerability
Products affected by CVE-2011-1655
- cpe:2.3:a:broadcom:total_defense:r12:*:*:*:*:*:*:*