CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Lifecycle Timeline
3DescriptionNVD
Cloud Foundry UUA is vulnerable to a bypass that allows an attacker to obtain a token for any user and gain access to UAA-protected systems. This vulnerability exists when SAML 2.0 bearer assertions are enabled for a client, as the UAA accepts SAML 2.0 bearer assertions that are neither signed nor encrypted. This issue affects UUA from v77.30.0 to v78.7.0 (inclusive) and it affects CF Deployment from v48.7.0 to v54.14.0 (inclusive).
AnalysisAI
Authentication bypass in Cloud Foundry UAA allows remote unauthenticated attackers to obtain access tokens for arbitrary users when SAML 2.0 bearer assertions are enabled, leading to unauthorized access to all UAA-protected systems. Affects UAA versions 77.30.0 through 78.7.0 and CF Deployment versions 48.7.0 through 54.14.0. …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Inventory all Cloud Foundry UAA deployments and identify those running versions 77.30.0-78.7.0 or CF Deployment versions 48.7.0-54.14.0; temporarily disable SAML 2.0 bearer assertion authentication if operationally feasible, or restrict UAA network access to trusted networks only. Within 7 days: Contact Pivotal/VMware support for emergency patched versions or detailed mitigation guidance; implement network segmentation to limit UAA exposure. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today