CWE
522
Advisory Published
Updated

CVE-2023-26221: TIBCO Spotfire Insufficiently Protected Credential vulnerability

First published: Wed Nov 08 2023(Updated: )

The Spotfire Connectors component of TIBCO Software Inc.'s Spotfire Analyst, Spotfire Server, and Spotfire for AWS Marketplace contains an easily exploitable vulnerability that allows a low privileged attacker with read/write access to craft malicious Analyst files. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s Spotfire Analyst: versions 12.3.0, 12.4.0, and 12.5.0, Spotfire Server: versions 12.3.0, 12.4.0, and 12.5.0, and Spotfire for AWS Marketplace: version 12.5.0.

Credit: security@tibco.com

Affected SoftwareAffected VersionHow to fix
TIBCO Spotfire Analyst=12.3.0
TIBCO Spotfire Analyst=12.4.0
TIBCO Spotfire Analyst=12.5.0
Tibco Spotfire Analytics Platform=12.5.0
TIBCO Spotfire Server=12.3.0
TIBCO Spotfire Server=12.4.0
TIBCO Spotfire Server=12.5.0

Remedy

TIBCO has released updated versions of the affected components which address these issues. Spotfire Analyst versions 12.3.0, 12.4.0, and 12.5.0: update to version 14.0.0 or later Spotfire Server versions 12.3.0, 12.4.0, and 12.5.0: update to version 14.0.0 or later Spotfire for AWS Marketplace version 12.5.0: update to version 14.0.0 or later

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-26221?

    CVE-2023-26221 is a vulnerability in TIBCO Spotfire that allows a low privileged attacker to craft malicious Analyst files.

  • Which versions of TIBCO Spotfire are affected by CVE-2023-26221?

    TIBCO Spotfire Analyst versions 12.3.0, 12.4.0, and 12.5.0, as well as TIBCO Spotfire Server versions 12.3.0, 12.4.0, and 12.5.0, and Tibco Spotfire Analytics Platform version 12.5.0 are affected.

  • What is the severity of CVE-2023-26221?

    CVE-2023-26221 has a severity rating of medium (5 out of 10).

  • How can an attacker exploit CVE-2023-26221?

    An attacker with low privileges and read/write access can exploit CVE-2023-26221 by crafting malicious Analyst files.

  • Is there a fix available for CVE-2023-26221?

    It is recommended to update to the latest patched version of TIBCO Spotfire to mitigate the vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203