First published: Wed Mar 18 2020(Updated: )
An issue was discovered in ONAP SDC through Dublin. By accessing port 7001 of demo-sdc-sdc-wfd-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Onap Open Network Automation Platform | >=3.0.0<4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12118 is considered a critical vulnerability due to the potential for unauthenticated remote code execution.
To mitigate CVE-2019-12118, ensure that all ONAP components, specifically those accessed through port 7001, are properly secured and updated to the latest version.
Any installations of the ONAP Open Network Automation Platform between versions 3.0.0 and 4.0.0 are at risk from CVE-2019-12118.
CVE-2019-12118 allows an attacker with pod-to-pod communication access to execute arbitrary code within the affected ONAP SDC pod.
Yes, users should check for updates from the ONAP project to address the vulnerabilities associated with CVE-2019-12118.