CVE-2019-11286
moderate-risk
Published 2020-07-31
VMware GemFire versions prior to 9.10.0, 9.9.1, 9.8.5, and 9.7.5, and VMware Tanzu GemFire for VMs versions prior to 1.11.0, 1.10.1, 1.9.2, and 1.8.2, contain a JMX service available to the network which does not properly restrict input. A remote authenticated malicious user may request against the service with a crafted set of credentials leading to remote code execution.
Do I need to act?
~
2.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (2)
Gemfire
Tanzu Gemfire For Virtual Machines
Affected Vendors
References (2)
Vendor Advisory
https://tanzu.vmware.com/security/cve-2019-11286
Vendor Advisory
https://tanzu.vmware.com/security/cve-2019-11286
44
/ 100
moderate-risk
Severity
31/34 · Critical
Exploitability
6/34 · Minimal
Exposure
7/34 · Low