First published: Wed Mar 18 2020(Updated: )
An issue was discovered in ONAP SDC through Dublin. By accessing port 4001 of demo-sdc-sdc-onboarding-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Onap Open Network Automation Platform | >=3.0.0<4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12117 is classified as a critical vulnerability due to its potential for arbitrary code execution by an unauthenticated attacker.
To fix CVE-2019-12117, you should upgrade to a secure version of the ONAP Open Network Automation Platform that is beyond version 4.0.0.
CVE-2019-12117 impacts all ONAP Open Network Automation Platform versions between 3.0.0 and 4.0.0.
All ONAP Operations Manager (OOM) setups are susceptible to CVE-2019-12117 if they allow access to port 4001.
Users of affected ONAP systems face risks of arbitrary code execution, which could lead to full system compromise.