When the IBM Verify Gateway (IVG) components make API calls, there is insufficient protection of tenant secrets. Itβs possible for an attacker to obtain the access token belonging to another tenant and issue an API while impersonating that tenant. As of v1.0.1 of IVG for RADIUS and IVG for AIX PAM, and v1.0.2 of IVG for Linux PAM and IVG for Windows Login, the client API secrets, access tokens, and cookies are scrubbed so that they cannot be captured for replay in another API call.
CVEID:CVE-2020-4847
DESCRIPTION:
CVSS Base score: 7.1
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM Verify Gateway (IVG) | RADIUS 1.0.0 |
IBM Verify Gateway (IVG) | PAM 1.0.0, 1.0.1 |
IBM Verify Gateway (IVG) | WinLogin 1.0.0, 1.0.1 |
Log in to IBM X-Force Exchange / App Exchange and download and install the latest IBM Security Verify Gateway (renamed from IBM Verify Gateway) components. Specifically:
None