5.6 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
4.7 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
IBM has released the following 7.3.1 Patch 1, and 7.2.8 Patch 4 for IBM QRadar Packet Capture in response to CVE-2017-5753, CVE-2017-5715 and CVE-2017-5754.
CVEID: CVE-2017-5753
CVEID: CVE-2017-5715
CVEID: CVE-2017-5754
IBM QRadar Packet Capture 7.3.0 – 7.3.1 GA
IBM QRadar Packet Capture 7.2.0 – 7.2.8.Patch 3
QRadar Packet Capture 7.3.1 Patch 1
QRadar Packet Capture 7.2.8 Patch 4
Please note in order to mitigate CVE-2017-5715 Spectre Variant #2, microcode will need to be updated on all appliances along with the Kernel update that is included in the QRadar Packet Capture Patch. Please see the links below for available microcode updates.
For Lenovo Appliance Firmware, see:
Lenovo x3650 M4 USB
Lenovo x3650 M4 ISO
For Dell Appliances, see:
For Dell R710 appliances select your Operating System and Download Version 6.5.0 BIOS
CPE | Name | Operator | Version |
---|---|---|---|
ibm qradar network packet capture software | eq | 7.3.1 | |
ibm qradar network packet capture software | eq | 7.2.8 |
5.6 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
4.7 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N