8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
In the WebSphere Application Server (WAS) admin console where the Rational Asset Manager (RAM) is deployed, the command execution and privilege escaltion vulnerabilites are observed. Information about these security vulnerabilities affecting WebSphere Application Server are published in the respective security bulletins.
Refer to the security bulletin(s) listed in the Remediation/Fixes section
IBM Rational Asset Manager 7.5 .1, 7.5.2.x, 7.5.3.x, and 7.5.4.
NOTE: Rational Asset Manager 7.5.2 and later versions does not support embedded WebSphere Application Server.
Refer to the following security bulletin for vulnerability details and information about fixes addressed by IBM WebSphere Application Server (WAS). Affected Supporting Product | Affected Supporting Product Security Bulletin |
---|---|
IBM WebSphere Application Server Version 7.0, 8.0, 8.5, and 9.0. | Security Bulletin: WebSphere Application Server is vulnerable to a remote code execution vulnerability (CVE-2020-4464) |
Security Bulletin: Privilege Escalation Vulnerability in WebSphere Application Server (CVE-2020-4362) |
None
CPE | Name | Operator | Version |
---|---|---|---|
ibm rational asset manager 7.5 .1, 7.5.2.x, 7.5.3.x, and | eq | 7.5.4. | |
note: rational asset manager | eq | 7.5.2 |
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C