Vulnerability Details : CVE-2014-0888
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
Products affected by CVE-2014-0888
- cpe:2.3:a:ibm:worklight:5.0.6.0:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.0.0:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.5.0:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.6.0:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:6.0.0.0:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.0.0:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.5.0:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:6.0.0.0:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.0.3:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.0.3:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.6.1:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.6.1:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:6.0.0.2:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:6.0.0.2:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.0.2:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.0.2:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:6.0.0.1:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:6.0.0.1:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.6.2:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.6.2:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:6.1.0.0:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:6.1.0.0:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:6.1.0.1:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.0.1:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.0.1:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.5.1:*:*:*:consumer:*:*:*
- cpe:2.3:a:ibm:worklight:5.0.5.1:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:worklight:6.1.0.1:*:*:*:enterprise:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:6.0.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:6.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:5.0.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:5.0.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:6.1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:6.1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:5.0.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:5.0.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:6.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:5.0.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:5.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:5.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:5.0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:mobile_foundation:5.0.6.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-0888
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 32 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-0888
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:N/AC:M/Au:S/C:N/I:P/A:P |
6.8
|
4.9
|
NIST |
CWE ids for CVE-2014-0888
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0888
-
http://www-01.ibm.com/support/docview.wss?uid=swg21682798
IBM Security Bulletin: IBM Worklight and IBM Mobile Foundation application authenticity bypass (CVE-2014-0888)Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/91239
IBM Worklight and IBM Mobile Foundation application authenticity bypass CVE-2014-0888 Vulnerability Report
Jump to