Vulnerability Details : CVE-2020-5414
VMware Tanzu Application Service for VMs (2.7.x versions prior to 2.7.19, 2.8.x versions prior to 2.8.13, and 2.9.x versions prior to 2.9.7) contains an App Autoscaler that logs the UAA admin password. This credential is redacted on VMware Tanzu Operations Manager; however, the unredacted logs are available to authenticated users of the BOSH Director. This credential would grant administrative privileges to a malicious user. The same versions of App Autoscaler also log the App Autoscaler Broker password. Prior to newer versions of Operations Manager, this credential was not redacted from logs. This credential allows a malicious user to create, delete, and modify App Autoscaler services instances. Operations Manager started redacting this credential from logs as of its versions 2.7.15, 2.8.6, and 2.9.1. Note that these logs are typically only visible to foundation administrators and operators.
Vulnerability category: Information leak
Products affected by CVE-2020-5414
- Vmware » Tanzu Application Service For Virtual MachinesVersions from including (>=) 2.7.0 and before (<) 2.7.19cpe:2.3:a:vmware:tanzu_application_service_for_virtual_machines:*:*:*:*:*:*:*:*
- Vmware » Tanzu Application Service For Virtual MachinesVersions from including (>=) 2.8.0 and before (<) 2.8.13cpe:2.3:a:vmware:tanzu_application_service_for_virtual_machines:*:*:*:*:*:*:*:*
- Vmware » Tanzu Application Service For Virtual MachinesVersions from including (>=) 2.9.0 and before (<) 2.9.7cpe:2.3:a:vmware:tanzu_application_service_for_virtual_machines:*:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:operations_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:operations_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:operations_manager:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-5414
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-5414
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.0
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:P |
6.8
|
6.4
|
NIST | |
5.7
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H |
0.9
|
4.7
|
Pivotal Software, Inc. | |
5.7
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H |
0.9
|
4.7
|
NIST |
CWE ids for CVE-2020-5414
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security@pivotal.io (Secondary)
-
The product writes sensitive information to a log file.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-5414
-
https://tanzu.vmware.com/security/cve-2020-5414
CVE-2020-5414: App Autoscaler logs credentials | Security | VMware TanzuVendor Advisory
Jump to