First published: Thu Jan 24 2019(Updated: )
Forcepoint User ID (FUID) server versions up to 1.2 have a remote arbitrary file upload vulnerability on TCP port 5001. Successful exploitation of this vulnerability may lead to remote code execution. To fix this vulnerability, upgrade to FUID version 1.3 or higher. To prevent the vulnerability on FUID versions 1.2 and below, apply local firewall rules on the FUID server to disable all external access to port TCP/5001. FUID requires this port only for local connections through the loopback interface.
Credit: psirt@forcepoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Forcepoint User ID | <1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6139 is a vulnerability in Forcepoint User ID (FUID) server versions up to 1.2 that allows remote arbitrary file upload, potentially leading to remote code execution.
CVE-2019-6139 is rated as critical with a severity value of 9.8.
To fix CVE-2019-6139, you need to upgrade to FUID version 1.3 or higher.
Forcepoint User ID (FUID) server versions up to 1.2 are affected by CVE-2019-6139.
The Common Weakness Enumeration (CWE) ID for CVE-2019-6139 is 434.