CVE-2019-13657

9.8 CRITICAL

📋 TL;DR

CVE-2019-13657 is a critical vulnerability in CA Performance Management software where default credentials allow remote attackers to execute arbitrary commands on affected systems. This affects CA Performance Management versions 3.5.x, 3.6.x before 3.6.9, and 3.7.x before 3.7.4. Attackers can compromise system security and gain full control of vulnerable installations.

💻 Affected Systems

Products:
  • CA Performance Management
Versions: 3.5.x, 3.6.x before 3.6.9, 3.7.x before 3.7.4
Operating Systems: All supported platforms for CA Performance Management
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable unless credentials have been changed from defaults.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining root/administrator access, deploying ransomware, stealing sensitive data, and pivoting to other network systems.

🟠

Likely Case

Remote code execution leading to data theft, installation of backdoors, and disruption of performance monitoring services.

🟢

If Mitigated

Limited impact if systems are isolated, monitored, and have network access controls preventing external exploitation.

🌐 Internet-Facing: HIGH - Default credentials allow unauthenticated remote attackers to execute arbitrary commands without any user interaction.
🏢 Internal Only: HIGH - Even internally, any user on the network could exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on Packet Storm and other security sites. Attack requires no authentication and uses default credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.6.9 for 3.6.x branch, 3.7.4 for 3.7.x branch

Vendor Advisory: https://techdocs.broadcom.com/us/product-content/recommended-reading/security-notices/ca-20191015-01-security-notice-for-ca-performance-management.html

Restart Required: Yes

Instructions:

1. Download appropriate patch from Broadcom support portal. 2. Backup current installation. 3. Apply patch following vendor instructions. 4. Restart CA Performance Management services. 5. Verify patch installation and change default credentials.

🔧 Temporary Workarounds

Change Default Credentials

all

Immediately change all default credentials for CA Performance Management installation

# Use CA Performance Management admin interface to change credentials
# No single command - use web interface or configuration tools

Network Isolation

all

Restrict network access to CA Performance Management to only trusted administrative networks

# Example firewall rule (Linux iptables):
iptables -A INPUT -p tcp --dport [CA_PM_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [CA_PM_PORT] -j DROP

🧯 If You Can't Patch

  • Immediately change all default credentials and implement strong password policies
  • Isolate vulnerable systems from internet and restrict internal network access using firewalls

🔍 How to Verify

Check if Vulnerable:

Check CA Performance Management version via admin interface or configuration files. Versions 3.5.x, 3.6.x before 3.6.9, and 3.7.x before 3.7.4 are vulnerable.

Check Version:

# Check version via admin interface or configuration files
# Exact command depends on installation method and platform

Verify Fix Applied:

Verify version is 3.6.9 or higher for 3.6.x branch, or 3.7.4 or higher for 3.7.x branch. Test that default credentials no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with default usernames
  • Unusual command execution patterns
  • Multiple login attempts from single source

Network Indicators:

  • Unusual outbound connections from CA Performance Management server
  • Traffic to known malicious IPs
  • Unexpected port scanning from the server

SIEM Query:

source="CA_Performance_Management" AND (event_type="authentication_failure" AND user="admin" OR user="administrator")

🔗 References

📤 Share & Export