{"api_version":"1","generated_at":"2026-04-23T11:34:48+00:00","cve":"CVE-2021-43055","urls":{"html":"https://cve.report/CVE-2021-43055","api":"https://cve.report/api/cve/CVE-2021-43055.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-43055","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-43055"},"summary":{"title":"CVE-2021-43055","description":"The eFTL Server component of TIBCO Software Inc.'s TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contains an easily exploitable vulnerability that allows clients to inherit the permissions of the client that initially connected on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO eFTL - Community Edition: versions 6.7.2 and below, TIBCO eFTL - Developer Edition: versions 6.7.2 and below, and TIBCO eFTL - Enterprise Edition: versions 6.7.2 and below.","state":"PUBLIC","assigner":"security@tibco.com","published_at":"2022-01-11 19:15:00","updated_at":"2022-07-12 17:42:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-11-2022-tibco-eftl-2021-43055","name":"https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-11-2022-tibco-eftl-2021-43055","refsource":"CONFIRM","tags":[],"title":"TIBCO Security Advisory: January 11, 2022 - TIBCO eFTL - 2021-43055 | TIBCO Software","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.tibco.com/services/support/advisories","name":"https://www.tibco.com/services/support/advisories","refsource":"CONFIRM","tags":[],"title":"Advisory | TIBCO Software","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-43055","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43055","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"43055","vulnerable":"1","versionEndIncluding":"6.7.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tibco","cpe5":"eftl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"community","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43055","vulnerable":"1","versionEndIncluding":"6.7.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tibco","cpe5":"eftl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"developer","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43055","vulnerable":"1","versionEndIncluding":"6.7.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tibco","cpe5":"eftl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@tibco.com","DATE_PUBLIC":"2022-01-11T17:00:00Z","ID":"CVE-2021-43055","STATE":"PUBLIC","TITLE":"TIBCO eFTL Token Caching Vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"TIBCO eFTL - Community Edition","version":{"version_data":[{"version_affected":"<=","version_value":"6.7.2"}]}},{"product_name":"TIBCO eFTL - Developer Edition","version":{"version_data":[{"version_affected":"<=","version_value":"6.7.2"}]}},{"product_name":"TIBCO eFTL - Enterprise Edition","version":{"version_data":[{"version_affected":"<=","version_value":"6.7.2"}]}}]},"vendor_name":"TIBCO Software Inc."}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The eFTL Server component of TIBCO Software Inc.'s TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contains an easily exploitable vulnerability that allows clients to inherit the permissions of the client that initially connected on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO eFTL - Community Edition: versions 6.7.2 and below, TIBCO eFTL - Developer Edition: versions 6.7.2 and below, and TIBCO eFTL - Enterprise Edition: versions 6.7.2 and below."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Successful execution of this vulnerability can result in an attacker gaining full access to communication on an existing channel on the affected system."}]}]},"references":{"reference_data":[{"name":"https://www.tibco.com/services/support/advisories","refsource":"CONFIRM","url":"https://www.tibco.com/services/support/advisories"},{"refsource":"CONFIRM","name":"https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-11-2022-tibco-eftl-2021-43055","url":"https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-11-2022-tibco-eftl-2021-43055"}]},"solution":[{"lang":"eng","value":"TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO eFTL - Community Edition versions 6.7.2 and below update to version 6.7.3 or later\nTIBCO eFTL - Developer Edition versions 6.7.2 and below update to version 6.7.3 or later\nTIBCO eFTL - Enterprise Edition versions 6.7.2 and below update to version 6.7.3 or later"}],"source":{"discovery":"INTERNAL"}},"nvd":{"publishedDate":"2022-01-11 19:15:00","lastModifiedDate":"2022-07-12 17:42:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tibco:eftl:*:*:*:*:community:*:*:*","versionEndIncluding":"6.7.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tibco:eftl:*:*:*:*:developer:*:*:*","versionEndIncluding":"6.7.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tibco:eftl:*:*:*:*:enterprise:*:*:*","versionEndIncluding":"6.7.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"43055","Ordinal":"219584","Title":"CVE-2021-43055","CVE":"CVE-2021-43055","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"43055","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}