First published: Tue Sep 22 2020(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Micro Focus Operations Bridge Reporter. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the product's installer. The issue results from incorrect permissions set on a resource used by the service. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM.
Credit: security@microfocus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus Operations Bridge Reporter | ||
Microfocus Operation Bridge Reporter | <=10.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-11855.
The severity of CVE-2020-11855 is high with a CVSS score of 8.4.
Micro Focus Operations Bridge Reporter versions up to and including 10.40 are affected by CVE-2020-11855.
An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit CVE-2020-11855.
Yes, you can find more information about CVE-2020-11855 at the following references: [Reference 1](https://softwaresupport.softwaregrp.com/doc/KM03710590) and [Reference 2](https://www.zerodayinitiative.com/advisories/ZDI-20-1217/).