First published: Thu May 25 2017(Updated: )
The UAA reset password flow in Cloud Foundry release v236 and earlier versions, UAA release v3.3.0 and earlier versions, all versions of Login-server, UAA release v10 and earlier versions and Pivotal Elastic Runtime versions prior to 1.7.2 is vulnerable to a brute force attack due to multiple active codes at a given time. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.
Credit: security_alert@emc.com security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.cloudfoundry.identity:cloudfoundry-identity-server | <3.3.0.1 | 3.3.0.1 |
Cloud Foundry UAA | <=10 | |
Cloud Foundry | <=236 | |
Pivotal Cloud Foundry Elastic Runtime | <=1.7.1 | |
Cloud Foundry User Account and Authentication (UAA) | <=3.3.0 | |
Pivotal Software Login Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3084 is classified as a high severity vulnerability due to its susceptibility to brute force attacks.
To fix CVE-2016-3084, upgrade to UAA release version 3.3.0.1 or newer, or ensure your Cloud Foundry and Pivotal Elastic Runtime versions are above the vulnerable thresholds.
CVE-2016-3084 affects Cloud Foundry release v236 and earlier, UAA release v3.3.0 and earlier, and all versions of the Login-server.
CVE-2016-3084 allows attackers to perform brute force attacks via the UAA reset password flow.
Yes, CVE-2016-3084 remains a concern for users running any affected versions of the software, which should be updated to mitigate the risk.