CA20200205-01: Security Notice for CA Unified Infrastructure Management

DX Unified Infrastructure Management (Nimsoft / UIM)

0 more products

7832

23 September 2021

08 August 2016

OPEN

 

Issued: February 5th, 2020

Last Updated: September 1st, 2021

CA Technologies, A Broadcom Company, is alerting customers to three vulnerabilities in CA Unified Infrastructure Management (Nimsoft / UIM). Multiple vulnerabilities exist that can allow an unauthenticated remote attacker to execute arbitrary code or commands, read from or write to systems, or conduct denial of service attacks. CA published solutions to address these vulnerabilities and recommends that all affected customers implement these solutions.

The first vulnerability, CVE-2020-8010, occurs due to improper ACL handling. A remote attacker can execute commands, read from, or write to the target system.

The second vulnerability, CVE-2020-8011, occurs due to a null pointer dereference. A remote attacker can crash the Controller service.

The third vulnerability, CVE-2020-8012, occurs due to a buffer overflow vulnerability in the Controller service. A remote attacker can execute arbitrary code.

Risk Rating

High (cumulative)

Platform(s)

All supported robot platforms (i.e. Windows, Linux, Solaris, AIX and HPUX)

Affected Products

UIM product versions 20.1, 20.3.x, and 9.20 and below are affected. The applicable component is robot (also known as controller).

The robot versions below 7.97HF8, 9.20HF9, 9.20SHF9, 9.33HF5, and 9.33SHF5 are affected.

How to determine if the installation is affected

Check for the controller version in IM or AC.  If the version is lower than 7.97HF8 for UIM 9.0.2, and 9.20HF9 or 9.20SHF9 for UIM 9.2.0, then it is affected.  If the version is lower than 9.33HF5 or 9.33SHF5 for UIM 20.1.x and UIM 20.3.x, then it is affected.

Solution

CA Technologies published the following solutions to address the vulnerabilities:

robot_update patches 7.97HF8 (or above), 9.20HF9 (or above), 9.20SHF9 (or above), 9.33HF5 (or above), and 9.33SHF5 (or above)

Note: UIM 8.5.1 users must upgrade robot to 7.97HF8 (or above).

Hotfixes are available at:

https://techdocs.broadcom.com/us/product-content/recommended-reading/technical-document-index/ca-unified-infrastructure-management-hotfix-index.html

References

CVE-2020-8010 - CA UIM Probe Improper ACL Handling RCE

CVE-2020-8011 - CA UIM Improper Probe Handling NPD DoS

CVE-2020-8012 - CA UIM nimbuscontroller Buffer Overflow RCE

 

Acknowledgement

CVE-2020-8010 - Milton Valencia (wetw0rk), IBM Public Cloud Red Team

CVE-2020-8011 - Milton Valencia (wetw0rk), IBM Public Cloud Red Team

CVE-2020-8012 - Milton Valencia (wetw0rk), IBM Public Cloud Red Team

Change History

Version 1.0: 2020-02-05 - Initial Release

Version 1.1: 2020-02-14 - Clarified “How to determine if installation is affected” section.

Version 1.2: 2021-09-01 - Added 20.1.x and 20.3.x information to the Affected Products, Solution, and "How to determine if the installation is affected" sections.

CA customers may receive product alerts and advisories by subscribing to Proactive Notifications.

Customers who require additional information about this notice may contact CA Technologies Support at https://support.broadcom.com/.

To report a suspected vulnerability in a CA Technologies product, please send a summary to the CA Technologies Product Vulnerability Response Team.

Copyright © 2021 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Broadcom, the pulse logo, Connecting everything, CA Technologies and the CA technologies logo are among the trademarks of Broadcom. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. service marks and logos referenced herein belong to their respective companies.