Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2018-15691

Severity
9.8CRITICAL
EPSS
41.7%
top 2.58%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 30
Latest updateMay 13

Description

Insecure deserialization of a specially crafted serialized object, in CA Release Automation 6.5 and earlier, allows attackers to potentially execute arbitrary code.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDbroadcom/release_automation6.36.3.0.9945+2
CVEListV5ca_technologies/release_automation6.5 and earlier

Patches

🔴Vulnerability Details

2
GHSA
GHSA-m499-qj3g-vhpx: Insecure deserialization of a specially crafted serialized object, in CA Release Automation 62022-05-13
CVEList
CVE-2018-15691: Insecure deserialization of a specially crafted serialized object, in CA Release Automation 62018-08-30

💥Exploits & PoCs

1
Exploit-DB
CA Release Automation NiMi 6.5 - Remote Command Execution2018-09-17
CVE-2018-15691 (CRITICAL CVSS 9.8) | Insecure deserialization of a speci | cvebase.io