Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-1542

EPSS 71.27% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-1542

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The RPC API in RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and enumerate users by sending an action packet to xmlrpc after an authorization failure.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
BMC Software BladeLogic Server Automation Suite RSCD Agent 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
BMC BladeLogic Server Automation(BSA)是美国BMC Software公司的一套用于服务器自动化管理、控制和配置的解决方案。该方案支持所有操作系统以及虚拟化和云计算平台自动安装、配置操作系统等。 基于Linux和UNIX平台的BMC BSA的RSCD代理中的RPC API存在安全漏洞。远程攻击者可通过在身份验证失败后向xmlrpc发送action数据包利用该漏洞绕过身份验证,枚举用户。以下版本受到影响:BMC BSA 8.2.x版本,8.3.x版本,8.5.x版本,8.6
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2016-1542

#POC DescriptionSource LinkShenlong Link
1A rebuilt version of the exploit for CVE-2016-1542 and CVE-2016-1543 from insinuator.nethttps://github.com/patriknordlen/bladelogic_bmc-cve-2016-1542POC Details
2BMC Bladelogic RSCD exploits including remote code execution - CVE-2016-1542, CVE-2016-1543, CVE-2016-5063https://github.com/bao7uo/bmc_bladelogicPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-1542

登录查看更多情报信息。

Same Patch Batch · n/a · 2016-06-13 · 74 CVEs total

CVE-2016-2473Android Qualcomm Wi-Fi驱动安全漏洞
CVE-2016-2493Android Broadcom Wi-Fi驱动提权漏洞
CVE-2016-2481Android Mediaserver 提权漏洞
CVE-2016-2480Android Mediaserver 提权漏洞
CVE-2016-2479Android Mediaserver 提权漏洞
CVE-2016-2478Android Mediaserver 提权漏洞
CVE-2016-2477Android Mediaserver 提权漏洞
CVE-2016-2476Android Mediaserver 提权漏洞
CVE-2016-2475Android Broadcom Wi-Fi驱动提权漏洞
CVE-2016-2474Android Qualcomm Wi-Fi驱动安全漏洞
CVE-2016-2482Android Mediaserver 提权漏洞
CVE-2016-2472Android Qualcomm Wi-Fi驱动安全漏洞
CVE-2016-2471Android Qualcomm Wi-Fi驱动安全漏洞
CVE-2016-2470Android Qualcomm Wi-Fi驱动安全漏洞
CVE-2016-2469Android Qualcomm声音驱动提权漏洞
CVE-2016-2468Android Qualcomm GPU Driver 提权漏洞
CVE-2016-2467Android Qualcomm声音驱动安全漏洞
CVE-2016-2466Android Qualcomm声音驱动安全漏洞
CVE-2016-2465Android Qualcomm Video Driver 本地提权漏洞
CVE-2016-2464Android libwebm 输入验证错误漏洞

Showing top 20 of 74 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2016-1542

No comments yet


Leave a comment