First published: Wed Nov 04 2015(Updated: )
HP ArcSight Logger 6.0.0.7307.1, ArcSight Command Center 6.8.0.1896.0, and ArcSight Connector Appliance 6.4.0.6881.3 use the root account to execute files owned by the arcsight user, which might allow local users to gain privileges by leveraging arcsight account access.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
HP ArcSight Connector Appliance Firmware | <=6.4.0.6881.3 | |
OpenText ArcSight Logger | =6.0.0.7307.1 | |
HP ArcSight Command Center | =6.8.0.1896.0 | |
HP ArcSight Connectors | <=7.1.3 | |
HP ArcSight Express | =4.0 | |
HP ArcSight Express | =4.0-p1 | |
OpenText ArcSight Management Center | <=2.0 | |
OpenText ArcSight Enterprise Security Manager | <=6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6030 is considered a high-severity vulnerability due to its potential for privilege escalation.
To fix CVE-2015-6030, ensure you update to the latest versions of affected HP ArcSight products that address this vulnerability.
CVE-2015-6030 affects HP ArcSight Logger version 6.0.0.7307.1, ArcSight Command Center version 6.8.0.1896.0, and various versions of ArcSight Connector Appliances.
CVE-2015-6030 enables local users to gain elevated privileges by exploiting the misuse of the arcsight account.
Currently, the best approach is to update the software as there are no documented effective workarounds for CVE-2015-6030.