Vulnerability Details : CVE-2014-5300
Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 allows remote attackers to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.
Vulnerability category: BypassGain privilege
Products affected by CVE-2014-5300
- cpe:2.3:a:adaptivecomputing:moab:*:*:*:*:*:*:*:*
- cpe:2.3:a:adaptivecomputing:moab:8.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-5300
4.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-5300
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-5300
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-5300
-
http://www.securityfocus.com/bid/70173
Moab HPC Suite CVE-2014-5300 Authentication Bypass Vulnerability
-
http://www.securityfocus.com/archive/1/533574/100/0/threaded
SecurityFocus
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/96699
Moab HPC Suite requests security bypass CVE-2014-5300 Vulnerability Report
-
http://www.adaptivecomputing.com/security-advisory/
Security AdvisoryVendor Advisory
-
http://www.exploit-db.com/exploits/34865
Moab < 7.2.9 - Authentication Bypass - Multiple webapps ExploitExploit
-
http://packetstormsecurity.com/files/128483/Moab-Dynamic-Configuration-Authentication-Bypass.html
Moab Dynamic Configuration Authentication Bypass ≈ Packet StormExploit
Jump to