CVE-2019-13656
📋 TL;DR
This is a critical remote code execution vulnerability in CA Common Services DIA that allows unauthenticated attackers to execute arbitrary code on affected systems. It affects CA Client Automation 14 and Workload Automation AE 11.3.5-11.3.6 installations with the vulnerable component enabled.
💻 Affected Systems
- CA Client Automation
- CA Workload Automation AE
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to data theft, ransomware deployment, lateral movement across the network, and persistent backdoor installation.
Likely Case
Initial foothold for attackers to establish persistence, steal credentials, and move laterally within the network environment.
If Mitigated
Limited impact if proper network segmentation and access controls prevent exploitation attempts from reaching vulnerable systems.
🎯 Exploit Status
Public exploit code is available, making this easily weaponizable. The vulnerability requires no authentication and has low technical barriers to exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply patches from Broadcom/CA security advisory CA20190904-01
Restart Required: Yes
Instructions:
1. Download the appropriate patch from Broadcom support portal. 2. Stop all CA services. 3. Apply the patch according to vendor instructions. 4. Restart CA services. 5. Verify patch application.
🔧 Temporary Workarounds
Network Access Control
allRestrict network access to CA DIA service ports (default 5250/tcp and 5251/tcp) using firewall rules
# Windows: netsh advfirewall firewall add rule name="Block CA DIA" dir=in action=block protocol=TCP localport=5250,5251
# Linux: iptables -A INPUT -p tcp --dport 5250:5251 -j DROP
Service Disablement
allTemporarily disable the CA Common Services DIA service if not required
# Windows: sc stop "CA Common Services DIA" && sc config "CA Common Services DIA" start= disabled
# Linux: systemctl stop ca-dia && systemctl disable ca-dia
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected systems from untrusted networks
- Deploy host-based intrusion prevention systems (HIPS) to detect and block exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check if CA Common Services DIA service is running and version matches affected range. Use: netstat -an | findstr :5250 on Windows or ss -tlnp | grep :5250 on Linux.
Check Version:
# Windows: sc query "CA Common Services DIA" | findstr STATE
# Check CA product version through Control Panel or installation directory
Verify Fix Applied:
Verify patch installation through CA management console or check service version. Ensure the service no longer accepts unauthenticated remote commands.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from CA DIA service
- Failed authentication attempts to CA services
- Unexpected network connections to port 5250/5251
Network Indicators:
- Unusual traffic patterns to/from port 5250 or 5251
- Malformed packets targeting CA DIA service
- Command and control traffic originating from CA-managed systems
SIEM Query:
source="*ca*" AND (port=5250 OR port=5251) AND (event_type="process_creation" OR event_type="network_connection")
🔗 References
- http://packetstormsecurity.com/files/154418/CA-Common-Services-Distributed-Intelligence-Architecture-DIA-Code-Execution.html
- http://seclists.org/fulldisclosure/2019/Sep/15
- https://casupport.broadcom.com/us/product-content/recommended-reading/security-notices/CA20190904-01--security-notice-for-ca-common-services-distributed-intelligence-architecture-dia.html
- https://seclists.org/bugtraq/2019/Sep/14
- http://packetstormsecurity.com/files/154418/CA-Common-Services-Distributed-Intelligence-Architecture-DIA-Code-Execution.html
- http://seclists.org/fulldisclosure/2019/Sep/15
- https://casupport.broadcom.com/us/product-content/recommended-reading/security-notices/CA20190904-01--security-notice-for-ca-common-services-distributed-intelligence-architecture-dia.html
- https://seclists.org/bugtraq/2019/Sep/14