4.3
CVSSv2

CVE-2016-3084

Published: 25/05/2017 Updated: 06/08/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The UAA reset password flow in Cloud Foundry release v236 and previous versions versions, UAA release v3.3.0 and previous versions versions, all versions of Login-server, UAA release v10 and previous versions versions and Pivotal Elastic Runtime versions before 1.7.2 is vulnerable to a brute force attack due to multiple active codes at a given time. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pivotal software login-server -

cloudfoundry cloud foundry uaa bosh

pivotal software cloud foundry elastic runtime

pivotal software cloud foundry uaa

pivotal software cloud foundry