First published: Thu Feb 09 2017(Updated: )
The GemFire broker for Cloud Foundry 1.6.x before 1.6.5 and 1.7.x before 1.7.1 has multiple API endpoints which do not require authentication and could be used to gain access to the cluster managed by the broker.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software Gemfire For Pivotal Cloud Foundry | >=1.6.0<1.6.5 | |
Pivotal Software Gemfire For Pivotal Cloud Foundry | =1.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9880 is classified as a high severity vulnerability due to multiple unauthenticated API endpoints.
To fix CVE-2016-9880, upgrade to GemFire for Cloud Foundry version 1.6.5 or higher, or 1.7.1 or higher.
CVE-2016-9880 affects GemFire for Pivotal Cloud Foundry versions 1.6.x before 1.6.5 and 1.7.x before 1.7.1.
The risks of CVE-2016-9880 include unauthorized access to the cluster managed by the GemFire broker.
No, the vulnerable API endpoints in CVE-2016-9880 do not require authentication, allowing potential exploitation.