SpringSource tc Server 'JMX' Interface Security Bypass Vulnerability

Summary
This host is running SpringSource tc Server and is prone to security bypass vulnerability.
Impact
Successful exploitation will allow attacker to obtain JMX interface access via a blank password. Impact Level: Application
Solution
Update to SpringSource tc Server Runtime to 6.0.20.D or 6.0.25.A-SR01, For updates refer to http://www.springsource.com/products/tcserver
Insight
The flaw is cused due to error in, 'com.springsource.tcserver.serviceability.rmi.JmxSocketListener', if the listener is configured to use an encrypted password then entering either the correct password or an empty string will allow authenticated access to the JMX interface.
Affected
VMware SpringSource tc Server Runtime 6.0.19 and 6.0.20 before 6.0.20.D and 6.0.25.A before 6.0.25.A-SR01.
References