{"containers":{"cna":{"affected":[{"product":"Operation Bridge (containerized)","vendor":"Micro Focus","versions":[{"status":"affected","version":"2020.05"},{"status":"affected","version":"2019.08"},{"status":"affected","version":"2019.05"},{"status":"affected","version":"2018.11"},{"status":"affected","version":"2018.08"},{"status":"affected","version":"2018.05"},{"status":"affected","version":"2018.02"},{"status":"affected","version":"2017.11"}]},{"product":"Operation Bridge Manager","vendor":"Micro Focus","versions":[{"status":"affected","version":"2020.05"},{"status":"affected","version":"2019.11"},{"status":"affected","version":"2019.05"},{"status":"affected","version":"2018.11"},{"status":"affected","version":"2018.05"},{"status":"affected","version":"10.63"},{"status":"affected","version":"10.62"},{"status":"affected","version":"10.61"},{"status":"affected","version":"10.60"},{"status":"affected","version":"10.12"},{"status":"affected","version":"10.11"},{"lessThanOrEqual":"10.10","status":"affected","version":"unspecified","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Micro Focus would like to thank Pedro Ribeiro from Agile Information Security working with Trend Micro Zero Day Initiative for discovering and reporting the vulnerability"}],"descriptions":[{"lang":"en","value":"Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. The vulnerability could allow local attackers to execute code with escalated privileges."}],"exploits":[{"lang":"en","value":"Code execution with escalated privileges."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"description":"Code execution with escalated privileges","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2021-02-15T17:06:10.000Z","orgId":"f81092c5-7f14-476d-80dc-24857f90be84","shortName":"microfocus"},"references":[{"tags":["x_refsource_MISC"],"url":"https://softwaresupport.softwaregrp.com/doc/KM03747658"},{"tags":["x_refsource_MISC"],"url":"https://softwaresupport.softwaregrp.com/doc/KM03747854"},{"tags":["x_refsource_MISC"],"url":"https://www.zerodayinitiative.com/advisories/ZDI-20-1326/"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html"}],"solutions":[{"lang":"en","value":"For Operation Bridge Manager https://softwaresupport.softwaregrp.com/doc/KM03747658\nFor Operation Bridge (containerized) https://softwaresupport.softwaregrp.com/doc/KM03747854"}],"source":{"discovery":"EXTERNAL"},"title":"Code execution with escalated privilegesn vlnerability in Operation bridge Manager and Operations Bridge (containerized) products.","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@microfocus.com","ID":"CVE-2020-11858","STATE":"PUBLIC","TITLE":"Code execution with escalated privilegesn vlnerability in Operation bridge Manager and Operations Bridge (containerized) products."},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Operation Bridge (containerized)","version":{"version_data":[{"version_value":"2020.05"},{"version_value":"2019.08"},{"version_value":"2019.05"},{"version_value":"2018.11"},{"version_value":"2018.08"},{"version_value":"2018.05"},{"version_value":"2018.02"},{"version_value":"2017.11"}]}},{"product_name":"Operation Bridge Manager","version":{"version_data":[{"version_affected":"=","version_value":"2020.05"},{"version_affected":"=","version_value":"2019.11"},{"version_affected":"=","version_value":"2019.05"},{"version_affected":"=","version_value":"2018.11"},{"version_affected":"=","version_value":"2018.05"},{"version_affected":"=","version_value":"10.63"},{"version_affected":"=","version_value":"10.62"},{"version_affected":"=","version_value":"10.61"},{"version_affected":"=","version_value":"10.60"},{"version_affected":"=","version_value":"10.12"},{"version_affected":"=","version_value":"10.11"},{"version_affected":"<=","version_value":"10.10"}]}}]},"vendor_name":"Micro Focus"}]}},"credit":[{"lang":"eng","value":"Micro Focus would like to thank Pedro Ribeiro from Agile Information Security working with Trend Micro Zero Day Initiative for discovering and reporting the vulnerability"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. The vulnerability could allow local attackers to execute code with escalated privileges."}]},"exploit":[{"lang":"en","value":"Code execution with escalated privileges."}],"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Code execution with escalated privileges"}]}]},"references":{"reference_data":[{"name":"https://softwaresupport.softwaregrp.com/doc/KM03747658","refsource":"MISC","url":"https://softwaresupport.softwaregrp.com/doc/KM03747658"},{"name":"https://softwaresupport.softwaregrp.com/doc/KM03747854","refsource":"MISC","url":"https://softwaresupport.softwaregrp.com/doc/KM03747854"},{"name":"https://www.zerodayinitiative.com/advisories/ZDI-20-1326/","refsource":"MISC","url":"https://www.zerodayinitiative.com/advisories/ZDI-20-1326/"},{"name":"http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html"}]},"solution":[{"lang":"en","value":"For Operation Bridge Manager https://softwaresupport.softwaregrp.com/doc/KM03747658\nFor Operation Bridge (containerized) https://softwaresupport.softwaregrp.com/doc/KM03747854"}],"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T11:42:00.534Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://softwaresupport.softwaregrp.com/doc/KM03747658"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://softwaresupport.softwaregrp.com/doc/KM03747854"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.zerodayinitiative.com/advisories/ZDI-20-1326/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html"}]}]},"cveMetadata":{"assignerOrgId":"f81092c5-7f14-476d-80dc-24857f90be84","assignerShortName":"microfocus","cveId":"CVE-2020-11858","datePublished":"2020-10-27T16:45:12.000Z","dateReserved":"2020-04-16T00:00:00.000Z","dateUpdated":"2024-08-04T11:42:00.534Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}