First published: Tue Aug 09 2022(Updated: )
The ftlserver component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, TIBCO FTL - Enterprise Edition, and TIBCO FTL - Enterprise Edition contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a privilege escalation on the affected ftlserver. Affected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.0.0 through 6.8.0, TIBCO FTL - Developer Edition: versions 6.0.1 through 6.8.0, TIBCO FTL - Enterprise Edition: versions 6.0.0 through 6.7.3, and TIBCO FTL - Enterprise Edition: version 6.8.0.
Credit: security@tibco.com
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO FTL | >=6.0.0<=6.7.3 | |
TIBCO FTL | >=6.0.0<=6.8.0 | |
TIBCO FTL | >=6.0.1<=6.8.0 | |
TIBCO FTL | =6.8.0 |
TIBCO has released updated versions of the affected components which address these issues. TIBCO FTL - Community Edition versions 6.0.0 through 6.8.0: update to version 6.8.1 or later TIBCO FTL - Developer Edition versions 6.0.1 through 6.8.0: update to version 6.8.1 or later TIBCO FTL - Enterprise Edition versions 6.0.0 through 6.7.3: update to version 6.7.4 or later TIBCO FTL - Enterprise Edition version 6.8.0: update to version 6.8.1 or later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30573 refers to a vulnerability in the ftlserver component of TIBCO FTL, which allows a low privileged attacker to execute privileged code.
CVE-2022-30573 affects TIBCO FTL - Community Edition (version 6.0.0 to 6.8.0), TIBCO FTL - Developer Edition (version 6.0.1 to 6.8.0), and TIBCO FTL - Enterprise Edition (version 6.0.0 to 6.7.3, and version 6.8.0).
CVE-2022-30573 has a severity score of 8.8, which is classified as high.
CVE-2022-30573 allows a low privileged attacker with network access to execute privileged code in the ftlserver component of TIBCO FTL.
To fix CVE-2022-30573, it is recommended to apply the necessary patches or updates provided by TIBCO Software Inc. and follow their security advisory.