CVE-2021-43052

9.3 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication in TIBCO FTL Realm Server due to a hard-coded secret in default configurations. It affects all TIBCO FTL editions (Community, Developer, Enterprise) up to version 6.7.2. Attackers can gain unauthorized access without valid credentials.

💻 Affected Systems

Products:
  • TIBCO FTL - Community Edition
  • TIBCO FTL - Developer Edition
  • TIBCO FTL - Enterprise Edition
Versions: 6.7.2 and below
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default Realm Server configuration with hard-coded secret. Custom configurations may also be vulnerable if using default authentication mechanisms.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to access sensitive data, modify configurations, or disrupt messaging services across the entire FTL infrastructure.

🟠

Likely Case

Unauthorized access to messaging systems leading to data exfiltration, message interception, or service disruption.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable systems.

🌐 Internet-Facing: HIGH - Authentication bypass vulnerabilities on internet-facing systems allow direct unauthorized access.
🏢 Internal Only: HIGH - Even internally, this allows privilege escalation and lateral movement within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities are typically easy to exploit once the hard-coded secret is discovered. No authentication required to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.7.3 and above

Vendor Advisory: https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-11-2022-tibco-ftl-2021-43052

Restart Required: Yes

Instructions:

1. Download TIBCO FTL version 6.7.3 or later from TIBCO support portal. 2. Backup current configuration and data. 3. Stop all FTL services. 4. Install the updated version. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Disable Default Realm Server

all

Replace default Realm Server with custom authentication configuration using unique secrets

Modify realm-server-config.xml to use custom authentication provider
Replace hard-coded secrets with unique values

Network Isolation

all

Restrict network access to FTL Realm Server ports

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port protocol="tcp" port="PORT_NUMBER" accept'
netsh advfirewall firewall add rule name="Block FTL Auth" dir=in action=block protocol=TCP localport=PORT_NUMBER

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to FTL Realm Server only from trusted sources
  • Monitor authentication logs for unauthorized access attempts and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check TIBCO FTL version: if version is 6.7.2 or below, system is vulnerable. Also check if using default Realm Server configuration.

Check Version:

ftladmin version (on Windows) or ./ftladmin version (on Linux)

Verify Fix Applied:

Verify installed version is 6.7.3 or higher and test authentication with invalid credentials should fail.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Authentication events using default/hard-coded credentials
  • Unusual access patterns to Realm Server

Network Indicators:

  • Unauthorized connections to FTL Realm Server ports (typically 443 or custom ports)
  • Authentication bypass attempts

SIEM Query:

source="ftl_logs" AND (event_type="authentication" AND result="success" AND (credential_source="default" OR user="default"))

🔗 References

📤 Share & Export