Vulnerability Name: CVE-2020-1954 (CCN-178938) Assigned: 2019-12-02 Published: 2020-04-01 Updated: 2022-02-21 Summary: Apache CXF has the ability to integrate with JMX by registering an InstrumentationManager extension with the CXF bus. If the ‘createMBServerConnectorFactory‘ property of the default InstrumentationManagerImpl is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same host can connect to the registry and rebind the entry to another server, thus acting as a proxy to the original. They are then able to gain access to all of the information that is sent and received over JMX. CVSS v3 Severity: 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N )4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): AdjacentAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): NoneAvailibility (A): None
5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N )5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): NoneAvailibility (A): None
CVSS v2 Severity: 2.9 Low (CVSS v2 Vector: AV:A/AC:M/Au:N/C:P/I:N/A:N )Exploitability Metrics: Access Vector (AV): Adjacent_NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): None
5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:N/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): NoneAvailibility (A): None
Vulnerability Type: CWE-noinfo Vulnerability Consequences: Obtain Information References: Source: MITRE Type: CNACVE-2020-1954 Source: MISC Type: Vendor Advisoryhttp://cxf.apache.org/security-advisories.data/CVE-2020-1954.txt.asc?version=1&modificationDate=1585730169000&api=v2 Source: CCN Type: Apache CXF Web siteApache CXF Source: XF Type: UNKNOWNapache-cve20201954-mitm(178938) Source: MLIST Type: Exploit, Mailing List, Vendor Advisory[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html Source: MLIST Type: Mailing List, Vendor Advisory[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html Source: MLIST Type: Mailing List, Vendor Advisory[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html Source: CCN Type: oss-sec Mailing List, Wed, 1 Apr 2020 10:57:20 +0100CVE-2020-1954: Apache CXF JMX Integration is vulnerable to a MITM attack Source: CONFIRM Type: Patch, Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20220210-0001/ Source: CCN Type: IBM Security Bulletin 6253843 (Tivoli Application Dependency Discovery Manager)Apache CXF vulnerability identified in IBM Tivoli Application Dependency Discovery Manager (CVE-2020-1954) Source: CCN Type: IBM Security Bulletin 6254680 (Tivoli Network Manager IP Edition)A security vulnerability has been identified in Apache CXF, which is shipped with IBM Tivoli Network Manager (CVE-2020-1954). Source: CCN Type: IBM Security Bulletin 6344071 (QRadar SIEM)IBM QRadar SIEM is vulnerable to Using Components with Known Vulnerabilities Source: CCN Type: IBM Security Bulletin 6616295 (TRIRIGA Application Platform)BM TRIRIGA Application Platform discloses CVE-2020-1954 Source: CCN Type: IBM Security Bulletin 6831647 (Security Guardium)IBM Security Guardium is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 7005971 (Security Verify Governance)IBM Security Verify Governance uses components with known vulnerabilities (CVE-2021-22696, CVE-2021-30468, CVE-2020-1954) Source: CCN Type: Oracle CPUOct2020Oracle Critical Patch Update Advisory - October 2020 Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuoct2020.html Vulnerable Configuration: Configuration 1 :cpe:/a:apache:cxf:*:*:*:*:*:*:*:* (Version < 3.2.13)OR cpe:/a:apache:cxf:*:*:*:*:*:*:*:* (Version >= 3.3.0 and < 3.3.6) Configuration 2 :cpe:/a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* (Version >= 8.0.0 and <= 8.2.2)OR cpe:/a:oracle:communications_element_manager:*:*:*:*:*:*:*:* (Version >= 8.2.0 and <= 8.2.2) OR cpe:/a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:* (Version >= 8.2.0 and <= 8.2.2) OR cpe:/a:oracle:enterprise_manager_base_platform:13.2.1.0:*:*:*:*:*:*:* OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* Configuration 3 :cpe:/a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* OR cpe:/a:netapp:snapmanager:-:*:*:*:*:sap:*:* Configuration 4 :cpe:/a:oracle:communications_diameter_signaling_router_idih::*:*:*:*:*:*:*:* (Version >= 8.0.0 and <= 8.2.2)OR cpe:/a:oracle:communications_element_manager:*:*:*:*:*:*:*:* (Version >= 8.2.0 and <= 8.2.2) OR cpe:/a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:* (Version >= 8.2.0 and <= 8.2.2) OR cpe:/a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:* (Version >= 8.2.0 and <= 8.2.2) OR cpe:/a:oracle:enterprise_manager_base_platform:13.2.1.0:*:*:*:*:*:*:* OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:apache:cxf:3.3.5:*:*:*:*:*:*:* OR cpe:/a:apache:cxf:3.2.12:*:*:*:*:*:*:* AND cpe:/a:ibm:tririga_application_platform:2.7:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_network_manager:4.2:*:ip:*:*:*:*:* OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:10.5:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:10.6:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3.0.7:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.1:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3.3:p4:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.0:-:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.1:-:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.2:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.3:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.4:*:*:*:*:*:*:* OR cpe:/a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
apache cxf *
apache cxf *
oracle communications diameter signaling router *
oracle communications element manager *
oracle communications session report manager *
oracle enterprise manager base platform 13.2.1.0
oracle peoplesoft enterprise peopletools 8.56
netapp oncommand workflow automation -
netapp snapmanager -
oracle communications diameter signaling router idih: *
oracle communications element manager *
oracle communications session report manager *
oracle communications session route manager *
oracle enterprise manager base platform 13.2.1.0
oracle peoplesoft enterprise peopletools 8.56
apache cxf 3.3.5
apache cxf 3.2.12
ibm tririga application platform 2.7
ibm tivoli network manager 4.2
oracle peoplesoft enterprise peopletools 8.56
ibm security guardium 10.5
ibm qradar security information and event manager 7.3.0
ibm security guardium 10.6
ibm tivoli application dependency discovery manager 7.3.0.0
ibm tivoli application dependency discovery manager 7.3.0.7
ibm security guardium 11.0
ibm security guardium 11.1
ibm qradar security information and event manager 7.3.3 p4
ibm qradar security information and event manager 7.4.0
ibm qradar security information and event manager 7.4.1 -
ibm security guardium 11.2
ibm security guardium 11.3
ibm security guardium 11.4
ibm security verify governance 10.0