BMC Server Automation RSCD Agent Weak ACL NSH Arbitrary Command Execution

critical Nessus Plugin ID 91947
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The RSCD agent running on the remote host is affected by a remote command execution vulnerability.

Description

The BMC Server Automation RSCD agent running on the remote host is configured in such a manner as to publicly expose an API that can be used for unrestricted command execution. An unauthenticated, remote attacker can exploit this, via the NSH protocol, to execute arbitrary commands.

Solution

Update the exports file to restrict access to the interface.

See Also

http://www.bmc.com/it-solutions/truesight-server-automation.html

https://docs.bmc.com/docs/ServerAutomation/88/home-641429516.html

http://www.nessus.org/u?a5bac314

Plugin Details

Severity: Critical

ID: 91947

File Name: bmc_rscd_nsh_acl_check.nbin

Version: 1.106

Type: remote

Family: Misc.

Published: 7/5/2016

Updated: 9/13/2021

Dependencies: bmc_rscd_detect.nbin

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:bmc:bladelogic_server_automation_rscd_agent

Exploited by Nessus: true