Remote Code Execution in Ignite Realtime Spark and ROAR Plugin on Windows
CVE-2020-12772

8.8HIGH

Key Information:

Status
Vendor
CVE Published:
12 May 2020

What is CVE-2020-12772?

A vulnerability in Ignite Realtime Spark 2.8.3 and its ROAR plugin on Windows allows an attacker to embed an external image in a chat message. When users access this message, the application sends NTLM hashes of their credentials to the attacker's host. This exposure of sensitive user information can lead to credential theft and unauthorized access to user systems. The issue is exacerbated when ROAR is configured for automatic access, increasing the risk of exploitation without user interaction.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.