Vulnerability Description
VMware GemFire versions prior to 9.10.0, 9.9.1, 9.8.5, and 9.7.5, and VMware Tanzu GemFire for VMs versions prior to 1.11.0, 1.10.1, 1.9.2, and 1.8.2, contain a JMX service available to the network which does not properly restrict input. A remote authenticated malicious user may request against the service with a crafted set of credentials leading to remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Gemfire | >= 9.7.0, < 9.7.5 |
| Vmware | Tanzu Gemfire For Virtual Machines | >= 1.8.0, < 1.8.2 |
Related Weaknesses (CWE)
References
- https://tanzu.vmware.com/security/cve-2019-11286Vendor Advisory
- https://tanzu.vmware.com/security/cve-2019-11286Vendor Advisory
FAQ
What is CVE-2019-11286?
CVE-2019-11286 is a vulnerability with a CVSS score of 9.1 (CRITICAL). VMware GemFire versions prior to 9.10.0, 9.9.1, 9.8.5, and 9.7.5, and VMware Tanzu GemFire for VMs versions prior to 1.11.0, 1.10.1, 1.9.2, and 1.8.2, contain a JMX service available to the network wh...
How severe is CVE-2019-11286?
CVE-2019-11286 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-11286?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Gemfire, Vmware Tanzu Gemfire For Virtual Machines.