CVE-2021-28823

TIBCO eFTL Windows Platform Installation vulnerability

Description

The Windows Installation component of TIBCO Software Inc.'s TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO eFTL - Community Edition: versions 6.5.0 and below, TIBCO eFTL - Developer Edition: versions 6.5.0 and below, and TIBCO eFTL - Enterprise Edition: versions 6.5.0 and below.

Remediation

Solution:

  • TIBCO has released updated versions of the affected components which address these issues. TIBCO eFTL - Community Edition versions 6.5.0 and below update to version 6.6.0 or higher TIBCO eFTL - Developer Edition versions 6.5.0 and below update to version 6.6.0 or higher TIBCO eFTL - Enterprise Edition versions 6.5.0 and below update to version 6.6.0 or higher

Category

8.8
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.04%
Vendor Advisory tibco.com
Affected: TIBCO Software Inc. TIBCO eFTL - Community Edition
Affected: TIBCO Software Inc. TIBCO eFTL - Developer Edition
Affected: TIBCO Software Inc. TIBCO eFTL - Enterprise Edition
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-28823?
CVE-2021-28823 has been scored as a high severity vulnerability.
How to fix CVE-2021-28823?
To fix CVE-2021-28823: TIBCO has released updated versions of the affected components which address these issues. TIBCO eFTL - Community Edition versions 6.5.0 and below update to version 6.6.0 or higher TIBCO eFTL - Developer Edition versions 6.5.0 and below update to version 6.6.0 or higher TIBCO eFTL - Enterprise Edition versions 6.5.0 and below update to version 6.6.0 or higher
Is CVE-2021-28823 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2021-28823 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-28823?
CVE-2021-28823 affects TIBCO Software Inc. TIBCO eFTL - Community Edition, TIBCO Software Inc. TIBCO eFTL - Developer Edition, TIBCO Software Inc. TIBCO eFTL - Enterprise Edition.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.