Lucene search

K
ibmIBM65AE66AC0A5109608F4D89BA78526339DF6A057864CE896E692649347C03832F
HistoryMar 09, 2021 - 6:38 p.m.

Security Bulletin: IBM Verify Gateway does not sufficiently guard against unauthorized API calls (CVE-2020-4847)

2021-03-0918:38:28
www.ibm.com
3
ibm verify gateway
api security
vulnerability
patched
latest versions

Summary

When the IBM Verify Gateway (IVG) components make API calls, there is insufficient protection of tenant secrets. It’s possible for an attacker to obtain the access token belonging to another tenant and issue an API while impersonating that tenant. As of v1.0.1 of IVG for RADIUS and IVG for AIX PAM, and v1.0.2 of IVG for Linux PAM and IVG for Windows Login, the client API secrets, access tokens, and cookies are scrubbed so that they cannot be captured for replay in another API call.

Vulnerability Details

CVEID:CVE-2020-4847
DESCRIPTION:
CVSS Base score: 7.1
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Verify Gateway (IVG) RADIUS 1.0.0
IBM Verify Gateway (IVG) PAM 1.0.0, 1.0.1
IBM Verify Gateway (IVG) WinLogin 1.0.0, 1.0.1

Remediation/Fixes

Log in to IBM X-Force Exchange / App Exchange and download and install the latest IBM Security Verify Gateway (renamed from IBM Verify Gateway) components. Specifically:

Workarounds and Mitigations

None

Related for 65AE66AC0A5109608F4D89BA78526339DF6A057864CE896E692649347C03832F