CVE-2021-28823

8.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in TIBCO eFTL installations on Windows. A low-privileged attacker with local access can insert malicious files that get executed with elevated privileges due to improper access restrictions. Affected are all TIBCO eFTL editions (Community, Developer, Enterprise) version 6.5.0 and below on Windows systems.

💻 Affected Systems

Products:
  • TIBCO eFTL - Community Edition
  • TIBCO eFTL - Developer Edition
  • TIBCO eFTL - Enterprise Edition
Versions: 6.5.0 and below
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Requires local access to the system with low privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise where an attacker gains administrative privileges, installs persistent malware, accesses sensitive data, and moves laterally across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional tools, and maintain persistence on compromised systems.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and network segmentation preventing lateral movement.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: HIGH - Attackers with initial access to Windows systems running vulnerable TIBCO eFTL can escalate privileges and compromise the host.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once access is obtained. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions above 6.5.0

Vendor Advisory: http://www.tibco.com/services/support/advisories

Restart Required: Yes

Instructions:

1. Download and install TIBCO eFTL version 6.6.0 or higher from TIBCO's official website. 2. Follow TIBCO's installation guide for upgrading. 3. Restart the eFTL service and any dependent applications.

🔧 Temporary Workarounds

Restrict installation directory permissions

windows

Apply strict access controls to the TIBCO eFTL installation directory to prevent low-privileged users from writing files.

icacls "C:\Program Files\TIBCO\eFTL" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F" /deny "Users:(OI)(CI)(W)"

Remove unnecessary local user access

windows

Limit local user accounts on systems running TIBCO eFTL to only authorized administrators.

🧯 If You Can't Patch

  • Isolate affected systems in a restricted network segment with no internet access and limited internal connectivity.
  • Implement strict monitoring and alerting for privilege escalation attempts and unusual file modifications in the TIBCO installation directory.

🔍 How to Verify

Check if Vulnerable:

Check TIBCO eFTL version via Control Panel > Programs and Features or by examining the installation directory properties. Verify version is 6.5.0 or below.

Check Version:

wmic product where "name like 'TIBCO eFTL%'" get version

Verify Fix Applied:

Confirm installed version is 6.6.0 or higher. Verify file permissions on the installation directory restrict write access to non-administrative users.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Log entries showing file creation/modification in TIBCO installation directory by non-admin users
  • Privilege escalation events in security logs
  • Unexpected process execution from TIBCO directories

Network Indicators:

  • Unusual outbound connections from systems running TIBCO eFTL
  • Lateral movement attempts from previously low-privileged accounts

SIEM Query:

source="Windows Security" EventCode=4688 NewProcessName="*TIBCO*" OR source="Windows Security" EventCode=4663 ObjectName="*TIBCO*eFTL*"

🔗 References

📤 Share & Export