Vulnerability Description
An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for a domain authenticated user to send a crafted message to the Blue Prism Server and accomplish a remote code execution attack that is possible because of insecure deserialization. Exploitation of this vulnerability allows for code to be executed in the context of the Blue Prism Server service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ssctech | Blue Prism | >= 6.4, < 7.1 |
Related Weaknesses (CWE)
References
- https://blueprism.comProduct
- https://community.blueprism.com/discussion/security-vulnerability-notification-sVendor Advisory
- https://portal.blueprism.com/security-vulnerabilities-august-2022Permissions RequiredVendor Advisory
- https://blueprism.comProduct
- https://community.blueprism.com/discussion/security-vulnerability-notification-sVendor Advisory
- https://portal.blueprism.com/security-vulnerabilities-august-2022Permissions RequiredVendor Advisory
FAQ
What is CVE-2022-36119?
CVE-2022-36119 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for a domain authenticated user to send...
How severe is CVE-2022-36119?
CVE-2022-36119 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-36119?
Check the references section above for vendor advisories and patch information. Affected products include: Ssctech Blue Prism.