BlackBerry Enterprise Service Remote Code Execution (KB35139)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an application that is affected by a remote
code execution vulnerability.

Description :

According to its version, the BlackBerry Enterprise Service (BES)
install on the remote host is older than 10.1.3. Such versions may be
affected by a remote code execution vulnerability in its Universal
Device Service (UDS) component because it does not properly restrict
access to the JBoss Remote Method Invocation (RMI) interface. A
remote attacker within the adjacent network and with knowledge of the
address of that component could leverage this issue to upload
arbitrary packages via a request to port 1098 and then execute
code as the BES or UDS administration service account.

There are multiple workarounds detailed in the BlackBerry advisory
if updating BlackBerry Enterprise Service as a whole is not
possible. If any of these workarounds have been applied, this
finding may be a false positive.

See also :

http://www.blackberry.com/btsc/KB35139

Solution :

Update to BlackBerry Enterprise Service 10.1.3 or later or apply
a workaround detailed in the advisory.

Risk factor :

High / CVSS Base Score : 7.9
(CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 70498 ()

Bugtraq ID: 62920

CVE ID: CVE-2013-3693

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now