First published: Mon Jun 13 2016(Updated: )
The RPC API in the RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and reset arbitrary user passwords by sending an action packet to xmlrpc after an authorization failure.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bmc Bladelogic Server Automation Console | =8.2.02 | |
Bmc Bladelogic Server Automation Console | =8.2.03 | |
Bmc Bladelogic Server Automation Console | =8.2.04 | |
Bmc Bladelogic Server Automation Console | =8.3.00 | |
Bmc Bladelogic Server Automation Console | =8.3.01 | |
Bmc Bladelogic Server Automation Console | =8.3.02 | |
Bmc Bladelogic Server Automation Console | =8.3.03 | |
Bmc Bladelogic Server Automation Console | =8.5.00 | |
Bmc Bladelogic Server Automation Console | =8.5.01 | |
Bmc Bladelogic Server Automation Console | =8.6.00 | |
Bmc Bladelogic Server Automation Console | =8.7.00 |
https://selfservice.bmc.com/casemgmt/sc_KnowledgeArticle?sfdcid=kA214000000dBpnCAE&type=Solution
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1543 is considered a high severity vulnerability due to its potential for unauthorized password resets.
To fix CVE-2016-1543, you should upgrade to a version of BMC BladeLogic Server Automation that is patched against this vulnerability.
CVE-2016-1543 affects multiple versions of BMC BladeLogic Server Automation including 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX.
The impact of CVE-2016-1543 allows remote attackers to bypass authorization and reset arbitrary user passwords.
CVE-2016-1543 was reported in 2016, highlighting vulnerabilities present in various releases of BMC BladeLogic Server Automation.