First published: Mon Mar 18 2024(Updated: )
Lack of input sanitization in BMC Control-M branches 9.0.20 and 9.0.21 allows logged-in users for manipulation of generated web pages via injection of HTML code. This might lead to a successful phishing attack for example by tricking users into using a hyperlink pointing to a website controlled by an attacker. Fix for 9.0.20 branch was released in version 9.0.20.238. Fix for 9.0.21 branch was released in version 9.0.21.200.
Credit: cvd@cert.pl
Affected Software | Affected Version | How to fix |
---|---|---|
BMC Control-M/Agent | >=9.0.20<9.0.21 | |
BMC Control-M/Agent | =9.0.20.238 | |
BMC Control-M/Agent | =9.0.21.200 | |
>=9.0.20<9.0.20.238 | ||
>=9.0.21<9.0.21.201 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1606 is classified as a high-severity vulnerability due to the potential for successful phishing attacks.
To mitigate CVE-2024-1606, ensure that input sanitization is correctly implemented in BMC Control-M versions 9.0.20 and 9.0.21.
BMC Control-M versions 9.0.20 through 9.0.21, including specifically 9.0.20.238 and 9.0.21.200, are affected by CVE-2024-1606.
The impact of CVE-2024-1606 includes the risk of phishing attacks that could compromise user credentials and sensitive information.
No, exploitation of CVE-2024-1606 requires user interaction, as the vulnerability involves the manipulation of web pages by logged-in users.