CVE-2016-0930

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to gain SSH access to compilation VMs in Pivotal Cloud Foundry Ops Manager when using vCloud or vSphere. Attackers can exploit this during the installation-time period when these VMs exist using a default password. Organizations running affected PCF Ops Manager versions with vCloud/vSphere are vulnerable.

💻 Affected Systems

Products:
  • Pivotal Cloud Foundry Ops Manager
Versions: Versions before 1.6.19 and 1.7.x before 1.7.10
Operating Systems: Linux (compilation VMs)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using vCloud or vSphere as the IaaS. Compilation VMs exist only during installation/upgrade time windows.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of compilation VMs leading to lateral movement within the PCF environment, data exfiltration, and potential deployment of malicious containers or applications.

🟠

Likely Case

Unauthorized SSH access to compilation VMs allowing attackers to inspect build processes, inject malicious code into compiled artifacts, or use as pivot points for further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and timely patching, restricting attacker access to isolated compilation VMs only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to compilation VMs during their limited existence window. Default credentials are known/guessable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.19 or 1.7.10

Vendor Advisory: https://pivotal.io/security/cve-2016-0930

Restart Required: Yes

Instructions:

1. Upgrade Ops Manager to version 1.6.19 or 1.7.10. 2. Apply the updated Ops Manager tile. 3. Apply changes to the PCF deployment. 4. Verify compilation VMs use secure passwords.

🔧 Temporary Workarounds

Network segmentation

all

Isolate compilation VMs from untrusted networks during installation/upgrade windows

Temporary firewall rules

linux

Block SSH access to compilation VMs except from trusted management networks

iptables -A INPUT -p tcp --dport 22 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP

🧯 If You Can't Patch

  • Immediately change default passwords on compilation VMs after deployment
  • Minimize the time compilation VMs are accessible by scheduling installations during maintenance windows

🔍 How to Verify

Check if Vulnerable:

Check Ops Manager version and IaaS configuration. If using vCloud/vSphere with versions before 1.6.19 or 1.7.10, system is vulnerable.

Check Version:

Check Ops Manager web interface or deployment manifest for version information

Verify Fix Applied:

Verify Ops Manager version is 1.6.19+ or 1.7.10+. Confirm compilation VMs use strong, unique passwords.

📡 Detection & Monitoring

Log Indicators:

  • Failed SSH authentication attempts to compilation VMs
  • Successful SSH logins from unexpected sources
  • Compilation VM creation/deletion events

Network Indicators:

  • SSH connections to compilation VMs from unauthorized IPs
  • Unusual outbound traffic from compilation VMs

SIEM Query:

source="auth.log" AND "sshd" AND ("Failed password" OR "Accepted password") AND destination_ip="COMPILATION_VM_IP"

🔗 References

📤 Share & Export