Description
Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 allows remote attackers to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.
Exploits (1)
exploitdb
WORKING POC
by MWR InfoSecurity · textwebappsmultiple
https://www.exploit-db.com/exploits/34865
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/70173
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/533574/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/96699
Vendor Advisory x_refsource_confirm
http://www.adaptivecomputing.com/security-advisory/
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/34865
Exploit x_refsource_misc
http://packetstormsecurity.com/files/128483/Moab-Dynamic-Configuration-Authentication-Bypass.html
Scores
EPSS
0.1532
EPSS Percentile
94.7%
Details
CWE
CWE-287
Status
published
Products (2)
adaptivecomputing/moab
8.0
adaptivecomputing/moab
< 7.2.8
Published
Oct 08, 2014
Tracked Since
Feb 18, 2026