Lucene search

K
ibmIBM1FA81DDBB823E4A7F5CDDC6F12190DE396796515F69A2AD0C179A6DBD972F1E9
HistorySep 25, 2022 - 11:13 p.m.

Security Bulletin: Tivoli Federated Identity Manager Potential security exposure with IBM WebSphere Application Server APAR PM44303 (CVE-2012-3325)

2022-09-2523:13:40
www.ibm.com
6

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.8%

Abstract

If you have installed an interim fix for PM44303, Websphere Application Server Fixpack 21 or Fixpack 23 which includes APAR PM44303, there is the potential for an authenticated user to gain access to unauthorized resources.

Content

VULNERABILITY DETAILS:

DESCRIPTION:
The Tivoli Federated Identity Manager uses Websphere Application Server to provide Administrative services as a Websphere Enterprise Application.

If you have installed an Interim Fix for Websphere Application Server APAR PM44303, Websphere Application Server Fixpack 21 or Fixpack 23 which includes APAR PM44303 , you have the potential for an authenticated user on the network to bypass security restrictions, caused by an error when validating user credentials. This access requires a medium level of complexity. This could allow a user to gain unauthorized administrative access to an application and potentially gain access to confidential and critical customer data.

This could allow the user to modify the configuration of the TFIM server causing the server to work incorrectly. The user could also stop or uninstall the TFIM Admin console causing a denial of service for the TFIM clients. Lastly the user could modify the TFIM Administrator password allowing access to the TFIM Admin console and TFIM information.

**CVEID:*CVE-2012-3325
CVSS Base Score: 6.0
CVSS Environmental Score
: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:P/I:P/A:P)
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/77959&gt; for the current score

AFFECTED PRODUCTS AND VERSIONS:
Affected Versions:
TFIM 6.1.1, 6.2.0, 6.2.1, 6.2.2

REMEDIATION:

1. Determine the WAS server version which is available on the Integrated Systems Console Welcome page.
2. If an affected version is present, apply the updated fix identified below or upgrade to WAS version 7.0.0.24 or higher as soon as possible

Affected Fix VRMF APAR How to acquire updated fix
WAS Interim Fix 7.0.0.21-WS-WAS-MultiOS-IFPM71296 7.0.0.21 PM71296 _ http://www-01.ibm.com/support/docview.wss?uid=swg24033359_
WAS Interim Fix 7.0.0.23-WS-WAS-IFPM71296 7.0.0.23 _PM71296 _ _ http://www-01.ibm.com/support/docview.wss?uid=swg24033359_

Workaround(s):
None

Mitigation(s): None

REFERENCES:
๏‚ท Complete CVSS Guide
๏‚ท On-line Calculator V2
๏‚ท __CVE-__2012-3325
๏‚ท _X-Force Vulnerability Database _https://exchange.xforce.ibmcloud.com/vulnerabilities/77959
๏‚ท __Websphere Flash __http://www-01.ibm.com/support/docview.wss?uid=swg21609067

RELATED INFORMATION:
_IBM Secure Engineering Web Portal _
IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT
None

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โ€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ€ IBM PROVIDES THE CVSS SCORES โ€œAS ISโ€ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{โ€œProductโ€:{โ€œcodeโ€:โ€œSSZSXUโ€,โ€œlabelโ€:โ€œTivoli Federated Identity Managerโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU008โ€,โ€œlabelโ€:โ€œSecurityโ€},โ€œComponentโ€:โ€œโ€“โ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF002โ€,โ€œlabelโ€:โ€œAIXโ€},{โ€œcodeโ€:โ€œPF016โ€,โ€œlabelโ€:โ€œLinuxโ€},{โ€œcodeโ€:โ€œPF027โ€,โ€œlabelโ€:โ€œSolarisโ€},{โ€œcodeโ€:โ€œPF033โ€,โ€œlabelโ€:โ€œWindowsโ€},{โ€œcodeโ€:โ€œPF035โ€,โ€œlabelโ€:โ€œz/OSโ€},{โ€œcodeโ€:โ€œPF010โ€,โ€œlabelโ€:โ€œHP-UXโ€}],โ€œVersionโ€:โ€œ6.1.1;6.2;6.2.1;6.2.2โ€,โ€œEditionโ€:โ€œโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB24โ€,โ€œlabelโ€:โ€œSecurity Softwareโ€}},{โ€œProductโ€:{โ€œcodeโ€:โ€œSS4J57โ€,โ€œlabelโ€:โ€œTivoli Federated Identity Manager Business Gatewayโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU008โ€,โ€œlabelโ€:โ€œSecurityโ€},โ€œComponentโ€:null,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF002โ€,โ€œlabelโ€:โ€œAIXโ€},{โ€œcodeโ€:โ€œPF010โ€,โ€œlabelโ€:โ€œHP-UXโ€},{โ€œcodeโ€:โ€œPF016โ€,โ€œlabelโ€:โ€œLinuxโ€},{โ€œcodeโ€:โ€œPF027โ€,โ€œlabelโ€:โ€œSolarisโ€},{โ€œcodeโ€:โ€œPF033โ€,โ€œlabelโ€:โ€œWindowsโ€},{โ€œcodeโ€:โ€œPF035โ€,โ€œlabelโ€:โ€œz/OSโ€}],โ€œVersionโ€:โ€œ6.1.1;6.2;6.2.1;6.2.2โ€,โ€œEditionโ€:โ€œโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:null,โ€œlabelโ€:null}}]

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.8%

Related for 1FA81DDBB823E4A7F5CDDC6F12190DE396796515F69A2AD0C179A6DBD972F1E9