Vulnerability Name: CVE-2018-6491 (CCN-141555) Assigned: 2018-04-12 Published: 2018-04-12 Updated: 2019-10-09 Summary: Local Escalation of Privilege vulnerability to Micro Focus Universal CMDB, versions 10.20, 10.21, 10.22, 10.30, 10.31, 10.32, 10.33, 11.00. The vulnerability could be remotely exploited to Local Escalation of Privilege. CVSS v3 Severity: 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
8.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-noinfo Vulnerability Consequences: Gain Privileges References: Source: MITRE Type: CNACVE-2018-6491 Source: SECTRACK Type: Third Party Advisory, VDB Entry1040680 Source: XF Type: UNKNOWNmicro-focus-ucmdb-cve20186491-priv-esc(141555) Source: CCN Type: MFSBGN03803 rev.1UCMDB, Installation File Access Control Privilege Escalation Vulnerability Source: CONFIRM Type: Third Party Advisoryhttps://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03141180 Source: CCN Type: ZDI-18-299Hewlett Packard Enterprise Universal CMDB Product Installation File Access Control Privilege Escalation Vulnerability Vulnerable Configuration: Configuration 1 :cpe:/a:microfocus:ucmdb_configuration_manager:10.20:*:*:*:*:*:*:* OR cpe:/a:microfocus:ucmdb_configuration_manager:10.21:*:*:*:*:*:*:* OR cpe:/a:microfocus:ucmdb_configuration_manager:10.22:*:*:*:*:*:*:* OR cpe:/a:microfocus:ucmdb_configuration_manager:10.30:*:*:*:*:*:*:* OR cpe:/a:microfocus:ucmdb_configuration_manager:10.31:*:*:*:*:*:*:* OR cpe:/a:microfocus:ucmdb_configuration_manager:10.32:*:*:*:*:*:*:* OR cpe:/a:microfocus:ucmdb_configuration_manager:10.33:*:*:*:*:*:*:* OR cpe:/a:microfocus:ucmdb_configuration_manager:11.00:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
microfocus ucmdb configuration manager 10.20
microfocus ucmdb configuration manager 10.21
microfocus ucmdb configuration manager 10.22
microfocus ucmdb configuration manager 10.30
microfocus ucmdb configuration manager 10.31
microfocus ucmdb configuration manager 10.32
microfocus ucmdb configuration manager 10.33
microfocus ucmdb configuration manager 11.00