9.8
CVSSv3

CVE-2016-6599

Published: 30/01/2018 Updated: 26/02/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting configuration service (ConfigurationService) on port 9010. This service contains a method that can be used to retrieve a configuration file that contains the application database name, username and password as well as the domain administrator username and password. These are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm. The domain administrator username and password can only be obtained if the Self-Service component is enabled, which is the most common scenario in enterprise deployments.

Vulnerable Product Search on Vulmon Subscribe to Product

bmc track-it\\!

bmc track-it\\! 11.4

Exploits

>> Multiple critical vulnerabilities in BMC Track-It! 114 >> Discovered by Pedro Ribeiro (pedrib@gmailcom), Agile Information Security ================================================================================= Disclosure: 04/07/2016 / Last updated: 01/01/2017 >> Background and summary BMC Track-It! exposes several NET ...
BMC Track-It! version 114 suffers from remote code execution and credential disclosure vulnerabilities ...