Vulnerability Name:

CVE-2018-9026 (CCN-144855)

Assigned:2018-06-14
Published:2018-06-14
Updated:2021-04-12
Summary:A session fixation vulnerability in CA Privileged Access Manager 2.x allows remote attackers to hijack user sessions with a specially crafted request.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-384
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2018-9026

Source: BID
Type: Third Party Advisory, VDB Entry
104496

Source: CCN
Type: BID-104496
CA Privileged Access Manager Multiple Security Vulnerabilities

Source: CCN
Type: CA20180614-01
Security Notice for CA Privileged Access Manager

Source: XF
Type: UNKNOWN
ca-priv-cve20189026-session-hijacking(144855)

Source: CONFIRM
Type: Vendor Advisory
https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20180614-01--security-notice-for-ca-privileged-access-manager.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:broadcom:privileged_access_manager:*:*:*:*:*:*:*:* (Version >= 2.0.0 and < 3.0.0)

  • Configuration CCN 1:
  • cpe:/a:broadcom:privileged_access_manager:2.8.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    broadcom privileged access manager *
    ca privileged access manager 2.8.2