Lucene search

K
cve[email protected]CVE-2019-4072
HistoryMay 09, 2019 - 3:29 p.m.

CVE-2019-4072

2019-05-0915:29:04
CWE-613
web.nvd.nist.gov
20
ibm
tivoli
storage
productivity
center
spectrum
control
standard
edition
security
vulnerability
session
hijacking
ibm x-force
cve-2019-4072
nvd

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

5.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.3%

IBM Tivoli Storage Productivity Center (IBM Spectrum Control Standard Edition 5.2.1 through 5.2.17) allows users to remain idle within the application even when a user has logged out. Utilizing the application back button users can remain logged in as the current user for a short period of time, therefore users are presented with information for Spectrum Control Application. IBM X-Force ID: 157064.

Affected configurations

Vulners
NVD
Node
ibmspectrum_controlMatch5.2.1
OR
ibmspectrum_controlMatch5.2.8
OR
ibmspectrum_controlMatch5.2.11
OR
ibmspectrum_controlMatch5.2.12
OR
ibmspectrum_controlMatch5.2.13
OR
ibmspectrum_controlMatch5.2.14
OR
ibmspectrum_controlMatch5.2.15
OR
ibmspectrum_controlMatch5.2.16
OR
ibmspectrum_controlMatch5.2.10.1
OR
ibmspectrum_controlMatch5.2.15.2
OR
ibmspectrum_controlMatch5.2.17.0
OR
ibmspectrum_controlMatch5.2.17.1
VendorProductVersionCPE
ibmspectrum_control5.2.1cpe:2.3:a:ibm:spectrum_control:5.2.1:*:*:*:*:*:*:*
ibmspectrum_control5.2.8cpe:2.3:a:ibm:spectrum_control:5.2.8:*:*:*:*:*:*:*
ibmspectrum_control5.2.11cpe:2.3:a:ibm:spectrum_control:5.2.11:*:*:*:*:*:*:*
ibmspectrum_control5.2.12cpe:2.3:a:ibm:spectrum_control:5.2.12:*:*:*:*:*:*:*
ibmspectrum_control5.2.13cpe:2.3:a:ibm:spectrum_control:5.2.13:*:*:*:*:*:*:*
ibmspectrum_control5.2.14cpe:2.3:a:ibm:spectrum_control:5.2.14:*:*:*:*:*:*:*
ibmspectrum_control5.2.15cpe:2.3:a:ibm:spectrum_control:5.2.15:*:*:*:*:*:*:*
ibmspectrum_control5.2.16cpe:2.3:a:ibm:spectrum_control:5.2.16:*:*:*:*:*:*:*
ibmspectrum_control5.2.10.1cpe:2.3:a:ibm:spectrum_control:5.2.10.1:*:*:*:*:*:*:*
ibmspectrum_control5.2.15.2cpe:2.3:a:ibm:spectrum_control:5.2.15.2:*:*:*:*:*:*:*
Rows per page:
1-10 of 121

CNA Affected

[
  {
    "product": "Spectrum Control Standard Edition",
    "vendor": "IBM",
    "versions": [
      {
        "status": "affected",
        "version": "5.2.1"
      },
      {
        "status": "affected",
        "version": "5.2.8"
      },
      {
        "status": "affected",
        "version": "5.2.11"
      },
      {
        "status": "affected",
        "version": "5.2.12"
      },
      {
        "status": "affected",
        "version": "5.2.13"
      },
      {
        "status": "affected",
        "version": "5.2.14"
      },
      {
        "status": "affected",
        "version": "5.2.15"
      },
      {
        "status": "affected",
        "version": "5.2.16"
      },
      {
        "status": "affected",
        "version": "5.2.10.1"
      },
      {
        "status": "affected",
        "version": "5.2.15.2"
      },
      {
        "status": "affected",
        "version": "5.2.17.0"
      },
      {
        "status": "affected",
        "version": "5.2.17.1"
      }
    ]
  }
]

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

5.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.3%

Related for CVE-2019-4072