The UAA reset password flow in Cloud Foundry release v236 and earlier versions, UAA release v3.3.0 and earlier versions, all versions of Login-server, UAA release v10 and earlier versions and Pivotal Elastic Runtime versions prior to 1.7.2 is vulnerable to a brute force attack due to multiple active codes at a given time. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-3804 The UAA reset password flow in Cloud Foundry release v236 and earlier versions, UAA release v3.3.0 and earlier versions, all versions of Login-server, UAA release v10 and earlier versions and Pivotal Elastic Runtime versions prior to 1.7.2 is vulnerable to a brute force attack due to multiple active codes at a given time. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.
Github GHSA Github GHSA GHSA-fm5c-2rwc-887w Cloud Foundry UAA reset password vulnerable to brute force attack
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-08-05T23:40:15.665Z

Reserved: 2016-03-10T00:00:00

Link: CVE-2016-3084

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-05-25T17:29:00.630

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-3084

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.