CVE-2021-28825

8.8 HIGH

📋 TL;DR

This vulnerability allows a low-privileged attacker with local Windows access to insert malicious files into the TIBCO Messaging installation directory. When the legitimate software runs, it executes those files with elevated privileges, enabling privilege escalation. Affected are TIBCO Messaging - Eclipse Mosquitto Distribution Core Community and Enterprise Editions version 1.3.0 and below on Windows systems.

💻 Affected Systems

Products:
  • TIBCO Messaging - Eclipse Mosquitto Distribution - Core - Community Edition
  • TIBCO Messaging - Eclipse Mosquitto Distribution - Core - Enterprise Edition
Versions: 1.3.0 and below
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Linux/Unix installations are not vulnerable. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via privilege escalation to SYSTEM/administrator level, allowing installation of persistent malware, data theft, or lateral movement.

🟠

Likely Case

Local privilege escalation enabling attackers to bypass security controls, install additional tools, or access restricted resources.

🟢

If Mitigated

Limited to local user account compromise without ability to escalate privileges or access other systems.

🌐 Internet-Facing: LOW - Requires local access to the Windows system, not directly exploitable over network.
🏢 Internal Only: HIGH - Any compromised local user account on affected Windows systems can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and low privileges. The vulnerability is in file/folder permissions, making exploitation straightforward for attackers with local access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions above 1.3.0

Vendor Advisory: https://www.tibco.com/support/advisories/2021/04/tibco-security-advisory-april-14-2021-tibco-messaging-2021-28825

Restart Required: Yes

Instructions:

1. Download updated version from TIBCO support portal. 2. Stop all TIBCO Messaging services. 3. Run installer with administrative privileges. 4. Restart services after installation completes.

🔧 Temporary Workarounds

Restrict installation directory permissions

windows

Modify file system permissions on the TIBCO Messaging installation directory to prevent low-privileged users from writing files.

icacls "C:\Program Files\TIBCO\Messaging" /deny Users:(OI)(CI)W
icacls "C:\Program Files (x86)\TIBCO\Messaging" /deny Users:(OI)(CI)W

Run service with least privilege

windows

Configure TIBCO Messaging services to run with minimal required privileges rather than elevated system accounts.

sc config "TIBCO Messaging Service" obj= "NT AUTHORITY\LocalService"

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local access to affected Windows systems.
  • Monitor for suspicious file creation/modification in TIBCO installation directories using file integrity monitoring.

🔍 How to Verify

Check if Vulnerable:

Check TIBCO Messaging version and verify if running version 1.3.0 or below on Windows. Also check if low-privileged users have write access to installation directory.

Check Version:

Check version in TIBCO Messaging configuration files or via service properties in Windows Services manager.

Verify Fix Applied:

Verify version is above 1.3.0 and test that low-privileged users cannot write to installation directories.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file creation in TIBCO installation directories
  • Failed permission modification attempts on TIBCO directories
  • Unusual process execution from TIBCO directories

Network Indicators:

  • Not applicable - local privilege escalation only

SIEM Query:

EventID=4663 AND ObjectName LIKE '%TIBCO%Messaging%' AND Accesses LIKE '%Write%' AND SubjectUserName NOT IN (authorized_admin_users)

🔗 References

📤 Share & Export