Impact
The vulnerability enables an attacker who can reach the Talend JobServer or Talend ESB Runtime’s JMX monitoring port to execute arbitrary code without authentication. This permits full compromise of the host, affecting confidentiality, integrity, and availability.
Affected Systems
All releases of Talend JobServer and Talend ESB Runtime prior to the R2024‑07‑RT update are affected. The patch for JobServer adds TLS client authentication to the JMX monitoring port, while the R2024‑07‑RT patch disables the port by default for the ESB Runtime.
Risk and Exploitability
With a CVSS score of 9.8 the flaw is rated critical. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is the JMX monitoring port, which can be accessed from an external network, making exploitation straightforward and highly likely when the oversight is present.
OpenCVE Enrichment