CA Unified Infrastructure Management Directory Traversal Vulnerability (Update B)
Plan Patch8.6ICS-CERT ICSA-16-315-01BAug 14, 2016
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
CA Unified Infrastructure Management versions 8.47 and earlier contain a directory traversal vulnerability (CWE-23) in the web interface. An attacker can craft HTTP requests with relative path sequences to access files outside the intended web root directory, potentially reading sensitive configuration files, credentials, or logs, or writing files to alter system behavior. The vulnerability is remotely exploitable without authentication.
What this means
What could happen
An attacker could read sensitive files from the Unified Infrastructure Management system (such as configuration data, credentials, or logs), or modify files that could affect monitoring and control functions across your infrastructure.
Who's at risk
This affects organizations using CA Unified Infrastructure Management to monitor and manage IT and OT infrastructure, including water utilities and electric utilities that use UIM for SCADA/network monitoring. Site reliability engineers, network operations staff, and OT/IT monitoring teams should be concerned.
How it could be exploited
An attacker sends a specially crafted HTTP request with directory traversal sequences (../) to the UIM web interface to access files outside the intended directory. No authentication is required. The attacker can then read sensitive configuration files or potentially write files to alter system behavior.
Prerequisites
- Network access to the Unified Infrastructure Management web interface (typically port 80 or 443
- No authentication required
remotely exploitableno authentication requiredlow complexityno patch availablehigh CVSS score (8.6)
Exploitability
Moderate exploit probability (EPSS 5.4%)
Affected products (1)
ProductAffected VersionsFix Status
Unified Infrastructure Management: <=8.47≤ 8.47No fix (EOL)
Remediation & Mitigation
0/4
Do now
0/2HARDENINGRestrict network access to the Unified Infrastructure Management web interface using a firewall—only allow access from trusted management networks or jump hosts
WORKAROUNDDisable or restrict HTTP/HTTPS access to UIM if not actively in use, or place the system behind a WAF (Web Application Firewall) with rules to block directory traversal patterns
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HARDENINGMonitor UIM logs for suspicious requests containing directory traversal sequences (../ or encoded variants)
Mitigations - no patch available
0/1Unified Infrastructure Management: <=8.47 has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGContact Broadcom (CA) to discuss upgrade path or replacement for UIM—no patch is available for version 8.47 or earlier
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/7f456fe4-b04c-41ce-9216-527787d0376b