Lucene search

K
ibmIBM0E6C36AA0AE26A92B3320E10EB0FF0C10724B1CFCCE3BCA426B32FFB32CA660D
HistoryJun 28, 2023 - 10:07 p.m.

Security Bulletin: Multiple security vulnerabilities have been identified in IBM WebSphere Application Server, which is shipped with, or a required product for, IBM Tivoli Network Manager IP Edition (CVE-2018-1656, CVE-2018-12539)

2023-06-2822:07:45
www.ibm.com
7
ibm
websphere
tivoli
network manager
ip edition
security vulnerabilities
2018
fixes
java sdk
end of support

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

58.5%

Summary

IBM WebSphere Application Server is shipped with IBM Tivoli Network Manager IP Edition versions 3.9 and 4.1.1; IBM WebSphere Application Server is a required product for IBM Tivoli Network Manager IP Edition version 4.2. Information about security vulnerabilities affecting IBM WebSphere Application Server has been published in a security bulletin.

Vulnerability Details

Please consult the security bulletin Multiple Vulnerabilities in IBM® Java SDK affects WebSphere Application Server July 2018 CPU for vulnerability details and information about fixes.

Affected Products and Versions

IBM Tivoli Network Manager IP Edition 3.9, 4.1.1 and 4.2.

Remediation/Fixes

Refer to the following security bulletins for vulnerability details and information about fixes addressed by IBM WebSphere Application Server, which is shipped with IBM Tivoli Network Manager IP Edition versions 3.9 and 4.1.1; and a product required by IBM Tivoli Network Manager IP Edition version 4.2.

Principal Product and Version(s) Affected Supporting Product and Version Affected Supporting Product Security Bulletin
IBM Tivoli Network Manager IP Edition 3.9 Bundled the TIP version 2.1.0.x, which bundles IBM WebSphere version 7.0.0.x. Multiple Vulnerabilities in IBM® Java SDK affects WebSphere Application Server July 2018 CPU
See Section “For V7.0.0.0 through 7.0.0.45 WebSphere Application Server and WebSphere Application Server Hypervisor Edition:
IBM Tivoli Network Manager IP Edition 4.1.1 Bundled the TIP version 2.2.0.x, which bundles IBM WebSphere version 7.0.0.x. Multiple Vulnerabilities in IBM® Java SDK affects WebSphere Application Server July 2018 CPU
See Section “For V7.0.0.0 through 7.0.0.45 WebSphere Application Server and WebSphere Application Server Hypervisor Edition:
IBM Tivoli Network Manager IP Edition 4.2 IBM Tivoli Network Manager IP Edition 4.2 requires the installation of IBM WebSphere Application Server Version 8.5.5.5 or later version separately. Users are recommended to apply IBM WebSphere version 8.5.5.5 Security Interim Fixes. Multiple Vulnerabilities in IBM® Java SDK affects WebSphere Application Server July 2018 CPU
See Section “For V8.5.0.0 through 8.5.5.14 WebSphere Application Server Traditional and WebSphere Application Server Hypervisor Edition:

Please also note the** end of support announcement from 12 September 2017 for selected Netcool product versions. You can find detailed information on whether the product version you have installed in your environment is affected by this end of service announcement by following the Netcool End of Support Knowledge Collection. ** If your product version is affected, IBM recommend to upgrade your product version to the latest supported version of your product. Please contact your IBM account manager for any question you might have or for any assistance you may require for upgrading an end of service announced offering.

Workarounds and Mitigations

None.

Affected configurations

Vulners
Node
ibmtivoli_storage_managerMatch3.9
OR
ibmtivoli_storage_managerMatch4.1.1
OR
ibmtivoli_storage_managerMatch4.2

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

58.5%

Related for 0E6C36AA0AE26A92B3320E10EB0FF0C10724B1CFCCE3BCA426B32FFB32CA660D