Lucene search

K
ibmIBM1FB411436DB108CBCE07E0AE3B94144389AF54C7659FAF78B9CC56F8779BFA5A
HistoryJun 17, 2018 - 3:32 p.m.

Security Bulletin: vCenter password disclosure via application tracing in IBM Tivoli Storage Manager Client and IBM Tivoli Storage Manager for Virtual Environments:Data Protection for VMware (CVE-2016-6110)

2018-06-1715:32:51
www.ibm.com
8

0.0004 Low

EPSS

Percentile

5.1%

Summary

The IBM Tivoli Storage Manager Client may display the obfuscated VMware vCenter userID and password during VM backup with the INCLUDE.VMTSMVSS option when application tracing is enabled with VMTSMVSS flag. This problem only manifests when the Tivoli Storage Manager Client is used as the IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware data mover.

Vulnerability Details

CVEID: CVE-2016-6110**
DESCRIPTION:** IBM Tivoli Storage Manager disclosed unencrypted login credentials to Vmware vCenter that could be obtained by a local user.
CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/118265 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)

Affected Products and Versions

This security exposure affects:

  • Tivoli Storage Manager (IBM Spectrum Protect) Client levels 7.1.0.0 through 7.1.6.3
  • Tivoli Storage Manager for Virtual Environments (IBM Spectrum Protect for Virtual Environments): Data Protection for VMware levels 7.1.0.0 through 7.1.6.3.

Remediation/Fixes

Tivoli Storage Manager Client Release

| Fixing VRM Level|Platform|Link to Fix / Fix Availability Target
—|—|—|—
7.1| 7.1.6.4| Linux x86
Windows x64| http://www.ibm.com/support/docview.wss?uid=swg24042496

Tivoli Storage Manager for Virtual Environments: Data Protection for VMware Release Fixing VRM Level Platform Link to Fix / Fix Availability Target
7.1 7.1.6.4 Linux
Windows <http://www.ibm.com/support/docview.wss?uid=swg24042520&gt;

|
|
|

—|—|—|—

|
|
|

Workarounds and Mitigations

Application tracing is disabled by default. It is normally enabled only when directed by IBM support to troubleshoot an issue.

To minimize exposure to this vulnerability, disable tracing unless required and delete trace files that are no longer needed.

0.0004 Low

EPSS

Percentile

5.1%

Related for 1FB411436DB108CBCE07E0AE3B94144389AF54C7659FAF78B9CC56F8779BFA5A