First published: Fri Oct 10 2014(Updated: )
BMC Track-It! 11.3.0.355 does not require authentication on TCP port 9010, which allows remote attackers to upload arbitrary files, execute arbitrary code, or obtain sensitive credential and configuration information via a .NET Remoting request to (1) FileStorageService or (2) ConfigurationService.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bmc Track-it\! | =11.3.0.355 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4872 is considered a critical vulnerability due to its potential for remote code execution.
To remediate CVE-2014-4872, ensure that TCP port 9010 requires authentication and restrict access to authorized users only.
CVE-2014-4872 can allow attackers to upload arbitrary files, execute code, and access sensitive information without authentication.
CVE-2014-4872 specifically affects BMC Track-It! version 11.3.0.355.
Yes, attackers can exploit CVE-2014-4872 remotely due to the lack of authentication on the specified TCP port.