Lucene search

K
ibmIBM61D1DDE868ABDB42AFFD2F81616A3DB859203FEA89F76E25CF11A65B8B96FBE4
HistoryJun 28, 2023 - 10:11 p.m.

Security Bulletin: A security vulnerability has been identified in IBM WebSphere Application Server, which is shipped with, or a required product for, IBM Tivoli Network Manager IP Edition (CVE-2018-1904)

2023-06-2822:11:16
www.ibm.com
20
ibm websphere
tivoli network manager
security bulletin
remote code execution
version 3.9
version 4.1.1
version 4.2
security fixes
mitigation

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.005

Percentile

76.4%

Summary

IBM WebSphere Application Server is shipped with IBM Tivoli Network Manager IP Edition versions 3.9 and 4.1.1; IBM WebSphere Application Server is a required product for IBM Tivoli Network Manager IP Edition version 4.2. Information about a security vulnerability affecting IBM WebSphere Application Server has been published in a security bulletin.

Vulnerability Details

Please consult the security bulletin Potential Remote code execution vulnerability in WebSphere Application Server for vulnerability details and information about fixes.

Affected Products and Versions

IBM Tivoli Network Manager IP Edition 3.9, 4.1.1 and 4.2

Remediation/Fixes

Refer to the following security bulletins for vulnerability details and information about fixes addressed by IBM WebSphere Application Server, which is shipped with IBM Tivoli Network Manager IP Edition versions 3.9 and 4.1.1; and a product required by IBM Tivoli Network Manager IP Edition version 4.2.

Principal Product and Version(s) Affected Supporting Product and Version Affected Supporting Product Security Bulletin
IBM Tivoli Network Manager IP Edition 3.9 Bundled the TIP version 2.1.0.x, which bundles IBM WebSphere version 7.0.0.x. Potential Remote code execution vulnerability in WebSphere Application Server
See Section “For V7.0.0.0 through 7.0.0.45:
IBM Tivoli Network Manager IP Edition 4.1.1 Bundled the TIP version 2.2.0.x, which bundles IBM WebSphere version 7.0.0.x. Potential Remote code execution vulnerability in WebSphere Application Server
See Section “For V7.0.0.0 through 7.0.0.45:
IBM Tivoli Network Manager IP Edition 4.2 IBM Tivoli Network Manager IP Edition 4.2 requires the installation of IBM WebSphere Application Server Version 8.5.5.5 or later version separately. Users are recommended to apply IBM WebSphere version 8.5.5.5 Security Interim Fixes. Potential Remote code execution vulnerability in WebSphere Application Server
See Section “For V8.5.0.0 through 8.5.5.14:

Workarounds and Mitigations

None.

Affected configurations

Vulners
Node
ibmtivoli_network_manager_ip_editionMatch3.9
OR
ibmtivoli_network_manager_ip_editionMatch4.1.1
OR
ibmtivoli_network_manager_ip_editionMatch4.2

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.005

Percentile

76.4%

Related for 61D1DDE868ABDB42AFFD2F81616A3DB859203FEA89F76E25CF11A65B8B96FBE4