Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2020-11853Focus Hybrid Cloud Management vulnerability

6 documents4 sources
Severity
8.8HIGHNVD
EPSS
91.4%
top 0.34%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedOct 22
Latest updateMay 24

Description

Arbitrary code execution vulnerability affecting multiple Micro Focus products. 1.) Operation Bridge Manager affecting version: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions. 2.) Application Performance Management affecting versions : 9.51, 9.50 and 9.40 with uCMDB 10.33 CUP 3 3.) Data Center Automation affected version 2019.11 4.) Operations Bridge (containerized) affecting versions: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.1

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages14 packages

CVEListV5micro_focus/service_management_automation2020.02, 2020.05+1
NVDmicrofocus/hybrid_cloud_management2018.052020.05
CVEListV5micro_focus/hybrid_cloud_management2018.052020.05

🔴Vulnerability Details

2
GHSA
GHSA-w38w-pq32-vgxm: An arbitrary code execution vulnerability exists in Micro Focus Operation Bridge Manager 20202022-05-24
CVEList
Arbitrary code execution vulnerability on multiple Micro Focus products2020-10-22

💥Exploits & PoCs

3
Nuclei
Micro Focus Checks
Nuclei
Micro Focus Universal CMDB Default Login
Nuclei
Micro Focus Operations Bridge Manager <=2020.05 - Remote Code Execution
CVE-2020-11853 — HIGH severity | cvebase