Lucene search

K
ibmIBMC15FA0A7737DE149EE3BBE284802B92F64126F42AB199D459757926B6A0759C4
HistoryDec 15, 2023 - 7:45 p.m.

Security Bulletin: IBM InfoSphere Information Server is vulnerable to retrieval of access credentials by highly privileged users

2023-12-1519:45:11
www.ibm.com
13
ibm infosphere
information server
vulnerability
access credentials
privileged users
memory dump
sensitive information
affected products
versions
remediation
fixes
mitigations
access control
secure networks
administrative privileges
administrator groups
secure communication
kerberos

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

4.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.8%

Summary

A privileged user can access highly sensitive information in Information Server application memory. For example, they could generate a memory dump that could contain highly sensitive information, including access credentials.

Vulnerability Details

CVEID: CVE-2017-1495 DESCRIPTION: IBM InfoSphere Information Server could allow a privileged user to cause a memory dump that could contain highly sensitive information including access credentials.
CVSS Base Score: 4.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/128693 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

The following products, running on all supported platforms, are affected:
IBM InfoSphere Information Server: versions 9.1, 11.3, 11.5, and 11.7
IBM InfoSphere Information Server on Cloud: version 11.5

Remediation/Fixes

None

Workarounds and Mitigations

Mitigation Step:

ā€¢ Utilize strict access control and secured networks to restrict unauthorized users from gaining access to administrative privileges
ā€¢ Use Administrator Groups to limit access to root/admin
ā€¢ Enable secure communication (i.e. Kerberos) with source or target applications when available

Affected configurations

Vulners
Node
ibminfosphere_information_serverMatch9.1
OR
ibminfosphere_information_serverMatch11.5
OR
ibminfosphere_information_serverMatch11.3
OR
ibminfosphere_information_serverMatch11.7
OR
ibminfosphere_information_serverMatch9.1
OR
ibminfosphere_information_serverMatch11.5
OR
ibminfosphere_information_serverMatch11.3
OR
ibminfosphere_information_serverMatch11.7

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

4.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.8%

Related for C15FA0A7737DE149EE3BBE284802B92F64126F42AB199D459757926B6A0759C4