← Back to CVEs
CVE-2022-24082
CRITICAL9.8
Description
If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published7/19/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
pega:infinity
Weaknesses (CWE)
CWE-502CWE-502
References
http://packetstormsecurity.com/files/169480/Pega-Platform-8.7.3-Remote-Code-Execution.html(security@pega.com)
https://support.pega.com/support-doc/pega-security-advisory-b22-vulnerability-%E2%80%93-hotfix-matrix-0(security@pega.com)
http://packetstormsecurity.com/files/169480/Pega-Platform-8.7.3-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://support.pega.com/support-doc/pega-security-advisory-b22-vulnerability-%E2%80%93-hotfix-matrix-0(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.