CVE-2018-12414

TIBCO Rendezvous Vulnerable to CSRF Attacks

Description

The Rendezvous Routing Daemon (rvrd), Rendezvous Secure Routing Daemon (rvrsd), Rendezvous Secure Daemon (rvsd), Rendezvous Cache (rvcache), and Rendezvous Daemon Manager (rvdm) components of TIBCO Software Inc.'s TIBCO Rendezvous, TIBCO Rendezvous Developer Edition, TIBCO Rendezvous for z/Linux, TIBCO Rendezvous for z/OS, TIBCO Rendezvous Network Server, TIBCO Substation ES contain vulnerabilities which may allow an attacker to perform cross-site request forgery (CSRF) attacks. Affected releases are TIBCO Software Inc.'s TIBCO Rendezvous: versions up to and including 8.4.5, TIBCO Rendezvous Developer Edition: versions up to and including 8.4.5, TIBCO Rendezvous for z/Linux: versions up to and including 8.4.5, TIBCO Rendezvous for z/OS: versions up to and including 8.4.5, TIBCO Rendezvous Network Server: versions up to and including 1.1.2, and TIBCO Substation ES: versions up to and including 2.12.2.

Remediation

Solution:

  • TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions: TIBCO Rendezvous versions 8.4.5 and below update to version 8.4.6 or higher TIBCO Rendezvous Developer Edition versions 8.4.5 and below update to version 8.4.6 or higher TIBCO Rendezvous for z/Linux versions 8.4.5 and below update to version 8.4.6 or higher TIBCO Rendezvous for z/OS versions 8.4.5 and below update to version 8.4.6 or higher TIBCO Rendezvous Network Server versions 1.1.2 and below update to version 1.1.3 or higher TIBCO Substation ES versions 2.12.0 and below update to version 2.12.1 or higher

Category

7.5
CVSS
Severity: High
CVSS 3.0 •
CVSS 2.0 •
EPSS 0.17%
Vendor Advisory tibco.com Vendor Advisory tibco.com
Affected: TIBCO Software Inc. TIBCO Rendezvous
Affected: TIBCO Software Inc. TIBCO Rendezvous Developer Edition
Affected: TIBCO Software Inc. TIBCO Rendezvous for z/Linux
Affected: TIBCO Software Inc. TIBCO Rendezvous for z/OS
Affected: TIBCO Software Inc. TIBCO Rendezvous Network Server
Affected: TIBCO Software Inc. TIBCO Substation ES
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2018-12414?
CVE-2018-12414 has been scored as a high severity vulnerability.
How to fix CVE-2018-12414?
To fix CVE-2018-12414: TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions: TIBCO Rendezvous versions 8.4.5 and below update to version 8.4.6 or higher TIBCO Rendezvous Developer Edition versions 8.4.5 and below update to version 8.4.6 or higher TIBCO Rendezvous for z/Linux versions 8.4.5 and below update to version 8.4.6 or higher TIBCO Rendezvous for z/OS versions 8.4.5 and below update to version 8.4.6 or higher TIBCO Rendezvous Network Server versions 1.1.2 and below update to version 1.1.3 or higher TIBCO Substation ES versions 2.12.0 and below update to version 2.12.1 or higher
Is CVE-2018-12414 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2018-12414 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2018-12414?
CVE-2018-12414 affects TIBCO Software Inc. TIBCO Rendezvous, TIBCO Software Inc. TIBCO Rendezvous Developer Edition, TIBCO Software Inc. TIBCO Rendezvous for z/Linux, TIBCO Software Inc. TIBCO Rendezvous for z/OS, TIBCO Software Inc. TIBCO Rendezvous Network Server, TIBCO Software Inc. TIBCO Substation ES.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.