Lucene search

K
ibmIBM814520C3517008FA9216486E6E120E3B923562867F5C6179E3DB3F5A832DC710
HistoryMay 05, 2022 - 7:18 p.m.

Security Bulletin: TS3000 (TSSC/IMC) is vulnerable to privilege escalation vulnerability due to polkit ( CVE-2021-4034 )

2022-05-0519:18:30
www.ibm.com
27

0.0005 Low

EPSS

Percentile

16.3%

Summary

A privilege escalation vulnerability has been discovered in pkexec, a component of polkit. The TSSC does not use pkexec, but the executable does exist on the system. A patch has been provided that removes the executable from the file system.

Vulnerability Details

CVEID:CVE-2021-4034
**DESCRIPTION:**Polkit could allow a local authenticated attacker to gain elevated privileges on the system, caused by incorrect handling of the argument vectors in the pkexec utility. By crafting environment variables in a specific way, an attacker could exploit this vulnerability to execute commands with root privileges.
CVSS Base score: 7.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/218087 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product|**Version
**
—|—
TSSC/IMC| 9.2.16
TSSC/IMC| 9.2.14
TSSC/IMC| 9.2.11
TSSC/IMC| 9.1.11
TSSC/IMC| 9.1.9
TSSC/IMC| 9.1.7
TSSC/IMC| 9.0.6
TSSC/IMC| 9.0.4
TSSC/IMC| 8.6.6
TSSC/IMC| 8.5.5

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.

Product Version Remediation/Fix/Instructions
TSSC/IMC 9.2.16 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.2.14 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.2.11 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.1.11 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.1.9 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.1.7 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.0.6 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.0.4 Download patch and execute on TSSC/IMC system
TSSC/IMC 8.6.6 Download patch and execute on TSSC/IMC system
TSSC/IMC 8.5.5 Download patch and execute on TSSC/IMC system

Workarounds and Mitigations

None