First published: Sat Dec 03 2016(Updated: )
Alcatel-Lucent OmniVista 8770 2.0 through 3.0 exposes different ORBs interfaces, which can be queried using the GIOP protocol on TCP port 30024. An attacker can bypass authentication, and OmniVista invokes methods (AddJobSet, AddJob, and ExecuteNow) that can be used to run arbitrary commands on the server, with the privilege of NT AUTHORITY\SYSTEM on the server. NOTE: The discoverer states "The vendor position is to refer to the technical guidelines of the product security deployment to mitigate this issue, which means applying proper firewall rules to prevent unauthorised clients to connect to the OmniVista server."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Alcatel-Lucent OmniVista 8770 Network Management System | =2.0 | |
Alcatel-Lucent OmniVista 8770 Network Management System | =2.6 | |
Alcatel-Lucent OmniVista 8770 Network Management System | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9796 is considered a critical vulnerability due to its potential for unauthorized remote command execution.
To mitigate CVE-2016-9796, upgrade the Alcatel-Lucent OmniVista 8770 Network Management System to a patched version that addresses this vulnerability.
CVE-2016-9796 affects Alcatel-Lucent OmniVista 8770 versions 2.0, 2.6, and 3.0.
Exploiting CVE-2016-9796 allows attackers to bypass authentication and execute arbitrary commands on the underlying system.
Yes, CVE-2016-9796 specifically impacts network management software, making it a significant concern for network security.