Search for vulnerabilities
Vulnerability details: VCID-bb3d-fmzb-t3c2
Vulnerability ID VCID-bb3d-fmzb-t3c2
Aliases CVE-2016-1240
Summary
Status Published
Exploitability 2.0
Weighted Severity 6.3
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 7.0 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1240.json
epss 0.15385 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.15385 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.16354 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.19505 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.19505 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
epss 0.20656 https://api.first.org/data/v1/epss?cve=CVE-2016-1240
Data source Exploit-DB
Date added Oct. 3, 2016
Description Apache Tomcat 8/7/6 (Debian-Based Distros) - Local Privilege Escalation
Ransomware campaign use Known
Source publication date Oct. 3, 2016
Exploit type local
Platform linux
Source update date Oct. 3, 2016
Source URL http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.html
Data source Metasploit
Description Tomcat (6, 7, 8) packages provided by default repositories on Debian-based distributions (including Debian, Ubuntu etc.) provide a vulnerable tomcat init script that allows local attackers who have already gained access to the tomcat account (for example, by exploiting an RCE vulnerability in a java web application hosted on Tomcat, uploading a webshell etc.) to escalate their privileges from tomcat user to root and fully compromise the target system. Tested against Tomcat 8.0.32-1ubuntu1.1 on Ubuntu 16.04
Note
Stability:
  - crash-safe
Reliability:
  - repeatable-session
SideEffects:
  - artifacts-on-disk
  - config-changes
  - ioc-in-logs
Ransomware campaign use Unknown
Source publication date Sept. 30, 2016
Platform Linux
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/local/tomcat_ubuntu_log_init_priv_esc.rb
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1240.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.9439
EPSS Score 0.15385
Published At Aug. 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:38:36.207210+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/3081-1/ 37.0.0