First published: Tue Mar 23 2021(Updated: )
The Windows Installation component of TIBCO Software Inc.'s TIBCO Rendezvous and TIBCO Rendezvous Developer Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO Rendezvous: versions 8.5.1 and below and TIBCO Rendezvous Developer Edition: versions 8.5.1 and below.
Credit: security@tibco.com
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO Rendezvous | <=8.5.1 | |
TIBCO Rendezvous | <=8.5.1 | |
Microsoft Windows |
TIBCO has released updated versions of the affected components which address these issues. TIBCO Rendezvous versions 8.5.1 and below update to version 8.5.2 or higher TIBCO Rendezvous Developer Edition versions 8.5.1 and below update to version 8.5.2 or higher
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28817 has been classified as a low severity vulnerability.
To fix CVE-2021-28817, ensure you upgrade to TIBCO Rendezvous version 8.5.2 or later.
CVE-2021-28817 affects TIBCO Rendezvous and its Developer Edition versions up to and including 8.5.1.
CVE-2021-28817 requires local access for exploitation, making remote attacks unlikely.
CVE-2021-28817 could potentially allow a low privileged attacker to insert malicious software into the system.