Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-11858 : Security Advisory and Response

Learn about CVE-2020-11858, a critical code execution vulnerability in Micro Focus Operation Bridge Manager and Operation Bridge (containerized). Find out the impacted versions and mitigation steps.

A code execution vulnerability with escalated privileges in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized) has been identified.

Understanding CVE-2020-11858

This CVE involves a critical security issue that could allow local attackers to execute code with escalated privileges.

What is CVE-2020-11858?

The vulnerability affects specific versions of Operation Bridge Manager and Operation Bridge (containerized), potentially enabling attackers to run malicious code with elevated permissions.

The Impact of CVE-2020-11858

The vulnerability poses a high risk, with a CVSS base score of 7.8 (High severity). It could lead to code execution with escalated privileges, impacting confidentiality, integrity, and availability.

Technical Details of CVE-2020-11858

This section provides detailed technical information about the vulnerability.

Vulnerability Description

The vulnerability allows for code execution with escalated privileges in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized).

Affected Systems and Versions

        Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63, 10.62, 10.61, 10.60, 10.12, 10.11, 10.10, and earlier
        Operation Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11

Exploitation Mechanism

The vulnerability could be exploited by local attackers to execute code with escalated privileges.

Mitigation and Prevention

Protect your systems from CVE-2020-11858 with these mitigation strategies.

Immediate Steps to Take

        Apply vendor-provided patches promptly
        Monitor for any unusual activities on the affected systems
        Restrict access to vulnerable systems

Long-Term Security Practices

        Regularly update and patch software to prevent vulnerabilities
        Conduct security assessments and audits periodically
        Implement least privilege access controls

Patching and Updates

        For Operation Bridge Manager, refer to the provided solution link
        For Operation Bridge (containerized), follow the solution link provided

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now