BMC Server Automation rscd Service Authentication Bypass RCE

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The BMC Server Automation RSCD agent running on the remote host is
affected by a remote command execution vulnerability.

Description :

According to its self-reported version number, the BMC Server
Automation (BSA) RSCD agent running on the remote host is affected by
a remote command execution vulnerability due to a logic flaw in the
authentication process of the rscd network daemon. An unauthenticated,
remote attacker can exploit this issue to execute certain privileged
commands without providing valid client certificates or credentials.
Specifically, one such command is REMOTE_COPY_DIRECTORY, which can
be used to retrieve all files on the system with root privileges.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.

See also :

http://www.securityfocus.com/archive/1/539351

Solution :

Upgrade to BSA version 8.8 or later. Alternatively, apply version 8.7
Patch 3.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 93686 ()

Bugtraq ID: 92736

CVE ID: CVE-2016-4322

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now