CVE-2015-3189
low-risk
Published 2017-05-25
With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions 2.2.5 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.
Do I need to act?
-
0.18% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.7/10
Low
NETWORK
/ HIGH complexity
Affected Products (3)
Affected Vendors
References (2)
Vendor Advisory
https://pivotal.io/security/cve-2015-3189
Vendor Advisory
https://pivotal.io/security/cve-2015-3189
23
/ 100
low-risk
Severity
13/34 · Low
Exploitability
1/34 · Minimal
Exposure
9/34 · Low