CVE-2018-19635

9.8 CRITICAL

📋 TL;DR

CVE-2018-19635 is a privilege escalation vulnerability in CA Service Desk Manager that allows authenticated users to gain administrative privileges through the user interface. This affects versions 14.1 and 17 of the software. Attackers with standard user accounts can exploit this to take full control of the system.

💻 Affected Systems

Products:
  • CA Service Desk Manager
Versions: 14.1 and 17
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative privileges, access sensitive data, modify configurations, and potentially use the system as a foothold for lateral movement.

🟠

Likely Case

Privileged attackers escalate to administrative roles, access confidential service desk data, and manipulate ticket workflows or user permissions.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized privilege changes that can be detected and rolled back.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but exploitation is straightforward through the UI.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from CA Security Notice CA20190117-01

Vendor Advisory: https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20190117-01-security-notice-for-ca-service-desk-manager.html

Restart Required: Yes

Instructions:

1. Download the patch from CA Support. 2. Backup the system. 3. Apply the patch according to CA documentation. 4. Restart the Service Desk Manager service.

🔧 Temporary Workarounds

Restrict User Access

all

Limit user accounts to only necessary personnel and implement strict access controls.

Enhanced Monitoring

all

Monitor for privilege escalation attempts and unusual administrative activity.

🧯 If You Can't Patch

  • Isolate the Service Desk Manager system from critical networks
  • Implement application-level monitoring for privilege changes and administrative actions

🔍 How to Verify

Check if Vulnerable:

Check if running CA Service Desk Manager version 14.1 or 17 without the CA20190117-01 patch.

Check Version:

Check the application version through the Service Desk Manager interface or configuration files.

Verify Fix Applied:

Verify patch installation by checking version information and confirming with CA support documentation.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege changes
  • User role modifications outside normal workflows
  • Administrative actions from non-admin accounts

Network Indicators:

  • Unusual authentication patterns to administrative endpoints

SIEM Query:

source="ca_service_desk" AND (event_type="privilege_change" OR event_type="role_modification")

🔗 References

📤 Share & Export