Lucene search

K
ibmIBM732F2D7C522F312233126AC6C428852EBE0F1EBEFC17D9E69078808A239EA800
HistoryJul 17, 2023 - 5:28 p.m.

Security Bulletin: IBM Facsimile Support for i is vulnerable to local privilege escalation (CVE-2023-30988)

2023-07-1717:28:06
www.ibm.com
17
ibm
facsimile support
local privilege escalation
vulnerability
ptf
fix
ibm i
7.5
7.4
7.3
7.2

8.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Summary

IBM Facsimile Support for i is vulnerable to local privilege escalation as described in the vulnerability details section. IBM Facsimile Support for i has addressed the vulnerability as described in the remediation/fixes section.

Vulnerability Details

CVEID:CVE-2023-30988
**DESCRIPTION:**The IBM i product Facsimile Support for i contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the host operating system.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/254016 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM i 7.5
IBM i 7.4
IBM i 7.3
IBM i 7.2

Remediation/Fixes

The issue can be fixed by applying a PTF to IBM i. IBM i releases 7.5, 7.4, 7.3, and 7.2 installed with 5798-FAX version V5R8M0 will be fixed.

The IBM i PTF number for IBM i 5798-FAX version V5R8M0 contains the fix for the vulnerability.

IBM i Release| 5798-FAX
version V5R8M0 PTF Number| PTF Download Link
—|—|—
7.5| SI83583| <https://www.ibm.com/support/pages/ptf/SI83583&gt;
7.4| SI83583| <https://www.ibm.com/support/pages/ptf/SI83583&gt;
7.3| SI83583| <https://www.ibm.com/support/pages/ptf/SI83583&gt;
7.2 | SI83583| <https://www.ibm.com/support/pages/ptf/SI83583&gt;


<https://www.ibm.com/support/fixcentral&gt;

Important note: IBM recommends that all users running unsupported versions of affected products upgrade to supported and fixed version of affected products.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmibm_i_7.5_preventative_service_planningMatch7.5.0
OR
ibmibm_i_7.5_preventative_service_planningMatch7.4.0
OR
ibmiMatch7.5.0
OR
ibmiMatch7.4.0
OR
ibmiMatch7.3.0
OR
ibmiMatch7.2.0
OR
ibmibm_i_7.5_preventative_service_planningMatch7.3.0
OR
ibmibm_i_7.5_preventative_service_planningMatch7.2.0

8.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Related for 732F2D7C522F312233126AC6C428852EBE0F1EBEFC17D9E69078808A239EA800