Lucene search

K
ibmIBM88A79034C988160FDA6CDD039971B1BFD18DEF7D7137719DD7051A8AF753CCDF
HistoryMar 25, 2023 - 12:48 a.m.

Security Bulletin: Vulnerability in the TS3100/TS3200 Web User Interface could allow unauthorized library access (CVE-2011-1372)

2023-03-2500:48:46
www.ibm.com
5
ts3100
ts3200
administrative access
vulnerability
cve-2011-1372
firmware
fix central
mitigation
trusted network.

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.005

Percentile

75.8%

Abstract

Administrative access to the library may be obtained without supplying proper credentials.

Content

Security Bulletin: Vulnerability in the TS3100/TS3200 Web User Interface could allow unauthorized library access (CVE-2011-1372)

SUMMARY:
Administrative access to the library may be obtained without supplying proper credentials.

VULNERABILITY DETAILS:

**CVE ID:**CVE-2011-1372

DESCRIPTION:
A potential security vulnerability has been identified in the TS3100/TS3200 Web User Interface. The vulnerability could be exploited remotely to gain unauthorized access to the tape library without supplying the proper login credentials.

CVSS:
CVSS Base Score: 6.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/71026 for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:M/Au:N/C:P/I:P/A:P)

AFFECTED PLATFORMS:

All TS3100 and TS3200 tape libraries with firmware versions less than A.60.

REMEDIATION:

The recommended solution is to apply the fix for each named product. The fix is contained in firmware versions A.60 and above.

Fix:
Apply firmware version A.60 or later available from IBM Fix Central - _ _http://www-933.ibm.com/support/fixcentral/

Workaround:
None known, apply fixes.

Mitigation:
Connect the library directly to a workstation or private network that is trusted (i.e. access to the workstation or network is controlled or limited to persons that have administrator privileges or persons that can be trusted not to attempt to hack into the library).

REFERENCES

**ACKNOWLEDGEMENT:**This vulnerability was reported to IBM by Martin Murfitt of Trustwave’s SpiderLabs (reference number TWSL2011-018).

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

{“0”:{“Product”:{“code”:“SSF1OOQ”,“label”:“TS3200 Tape Library”},“Business Unit”:{“code”:“BU058”,“label”:“IBM Infrastructure w/TPS”},“Component”:“Not Applicable”,“Platform”:[{“code”:“”,“label”:“N/A”}],“Version”:“Not Applicable”,“Edition”:“N/A”,“Line of Business”:{“code”:“LOB26”,“label”:“Storage”}},“102”:{“Product”:{“code”:“SSYYDOM”,“label”:“TS3100 Tape Library”},“Business Unit”:{“code”:“BU058”,“label”:“IBM Infrastructure w/TPS”},“Line of Business”:{“code”:“LOB26”,“label”:“Storage”}},“1”:null,“2”:null,“3”:null,“4”:null,“5”:null,“6”:null,“7”:null,“8”:null,“9”:null,“10”:null,“11”:null,“12”:null,“13”:null,“14”:null,“15”:null,“16”:null,“17”:null,“18”:null,“19”:null,“20”:null,“21”:null,“22”:null,“23”:null,“24”:null,“25”:null,“26”:null,“27”:null,“28”:null,“29”:null,“30”:null,“31”:null,“32”:null,“33”:null,“34”:null,“35”:null,“36”:null,“37”:null,“38”:null,“39”:null,“40”:null,“41”:null,“42”:null,“43”:null,“44”:null,“45”:null,“46”:null,“47”:null,“48”:null,“49”:null,“50”:null,“51”:null,“52”:null,“53”:null,“54”:null,“55”:null,“56”:null,“57”:null,“58”:null,“59”:null,“60”:null,“61”:null,“62”:null,“63”:null,“64”:null,“65”:null,“66”:null,“67”:null,“68”:null,“69”:null,“70”:null,“71”:null,“72”:null,“73”:null,“74”:null,“75”:null,“76”:null,“77”:null,“78”:null,“79”:null,“80”:null,“81”:null,“82”:null,“83”:null,“84”:null,“85”:null,“86”:null,“87”:null,“88”:null,“89”:null,“90”:null,“91”:null,“92”:null,“93”:null,“94”:null,“95”:null,“96”:null,“97”:null,“98”:null,“99”:null,“100”:null,“101”:null}

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.005

Percentile

75.8%

Related for 88A79034C988160FDA6CDD039971B1BFD18DEF7D7137719DD7051A8AF753CCDF