9.3
CVSSv2

CVE-2014-6140

Published: 06/12/2014 Updated: 09/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

IBM Tivoli Endpoint Manager Mobile Device Management (MDM) prior to 9.0.60100 uses the same secret HMAC token across different customers' installations, which allows remote malicious users to execute arbitrary code via crafted marshalled Ruby objects in cookies to (1) Enrollment and Apple iOS Management Extender, (2) Self-service portal, (3) Trusted Services provider, or (4) Admin Portal.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ibm tivoli endpoint manager mobile device management

Exploits

During a penetration test, RedTeam Pentesting discovered that several IBM Endpoint Manager Components are based on Ruby on Rails and use static secret_token values With these values, attackers can create valid session cookies containing marshalled objects of their choosing This can be leveraged to execute arbitrary code when the Ruby on Rails app ...