Remote Code Execution in Ignite Realtime Spark and ROAR Plugin on Windows
CVE-2020-12772
8.8HIGH
What is CVE-2020-12772?
A vulnerability in Ignite Realtime Spark 2.8.3 and its ROAR plugin on Windows allows an attacker to embed an external image in a chat message. When users access this message, the application sends NTLM hashes of their credentials to the attacker's host. This exposure of sensitive user information can lead to credential theft and unauthorized access to user systems. The issue is exacerbated when ROAR is configured for automatic access, increasing the risk of exploitation without user interaction.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
