Vulnerability Description
com.springsource.tcserver.serviceability.rmi.JmxSocketListener in VMware SpringSource tc Server Runtime 6.0.19 and 6.0.20 before 6.0.20.D, and 6.0.25.A before 6.0.25.A-SR01, does not properly enforce the requirement for an encrypted (aka s2enc) password, which allows remote attackers to obtain JMX interface access via a blank password.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Tc Server | 6.0.19 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/39778Vendor Advisory
- http://www.securityfocus.com/archive/1/511307/100/0/threaded
- http://www.securityfocus.com/bid/40205
- http://www.springsource.com/security/cve-2010-1454Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58684
- http://secunia.com/advisories/39778Vendor Advisory
- http://www.securityfocus.com/archive/1/511307/100/0/threaded
- http://www.securityfocus.com/bid/40205
- http://www.springsource.com/security/cve-2010-1454Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58684
FAQ
What is CVE-2010-1454?
CVE-2010-1454 is a vulnerability with a CVSS score of 6.8 (MEDIUM). com.springsource.tcserver.serviceability.rmi.JmxSocketListener in VMware SpringSource tc Server Runtime 6.0.19 and 6.0.20 before 6.0.20.D, and 6.0.25.A before 6.0.25.A-SR01, does not properly enforce ...
How severe is CVE-2010-1454?
CVE-2010-1454 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-1454?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Tc Server.