This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the product's authentication mechanism. The product contains a hard-coded password for the diagnostics user account. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus Operations Bridge Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-20-1287 has been classified as a critical vulnerability due to its potential for remote code execution without authentication.
To address ZDI-20-1287, users should update their installations of Micro Focus Operations Bridge Manager to the latest patched version.
ZDI-20-1287 affects all installations of Micro Focus Operations Bridge Manager that have not been updated to mitigate this vulnerability.
Yes, ZDI-20-1287 can be exploited by remote attackers without requiring authentication, making it particularly dangerous.
ZDI-20-1287 is categorized as a remote code execution vulnerability related to the product's authentication mechanism.