Lucene search

K
ibmIBMF09E2CE769CC450C4C8F0E813A45242614DD1095E04697EA3BC7D5A344674CFD
HistoryJun 25, 2018 - 5:54 a.m.

Security Bulletin: Cross-site Scripting Vulnerability Addressed in Asset and Service Management (CVE-2014-3025)

2018-06-2505:54:54
www.ibm.com
4

EPSS

0.001

Percentile

44.2%

Summary

Cross-site scripting security vulnerability on webclient/utility/*.jsp in Maximo Asset Mgmt, Tivoli Asset Mgmt for IT, Tivoli Service Request Mgr, Change and Configuration Mgmt Database, and SmartCloud Control Desk.

Vulnerability Details

DESCRIPTION:
Customers who have Maximo Asset Management, Maximo Asset Management Essentials, Maximo Industry Solutions (including Maximo for Government, Maximo for Nuclear Power, Maximo for Transportation, Maximo for Life Sciences, Maximo for Oil and Gas and Maximo for Utilities), Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, Change and Configuration Management Database, and SmartCloud Control Desk are potentially impacted by this vulnerability, which can cause issues related to confidentiality.

CVE-2014-3025
CVSS Base Score: 3.5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93064&gt;
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N
APAR: IV57241

Affected Products and Versions

1. Maximo Asset Management 7.5, 7.1, 6.2
2. Maximo Asset Management Essentials 7.5, 7.1, 6.2
3. Maximo for Government 7.5, 7.1, 6.2
4. Maximo for Nuclear Power 7.5, 7.1, 6.2, 6.3
5. Maximo for Transportation 7.5, 7.1, 6.2, 6.3
6. Maximo for Life Sciences 7.5, 7.1, 6.2, 6.4, 6.5
7. Maximo for Oil and Gas 7.5, 7.1, 6.2, 6.3, 6.4
8. Maximo for Utilities 7.5, 7.1, 6.2, 6.3
9. SmartCloud Control Desk 7.5
10. Tivoli Asset Management for IT 7.2, 7.1, 6.2
11. Tivoli Service Request Manager 7.2, 7.1, Maximo Service Desk 6.2
12. Change and Configuration Management Database 7.2, 7.1

It is likely that earlier versions of affected products are also affected by these vulnerabilities. Remediation is not provided for product versions that are no longer supported. IBM recommends that customers upgrade to the latest supported version of products in order to obtain remediation for the vulnerabilities.

Remediation/Fixes

_VENDOR FIXES: _
The recommended solution is to download the appropriate Interim Fix or Fix Pack from Fix Central (What is Fix Central?) and apply for each affected product as soon as possible. Please see below for information on the fixes available for each product, version, and release. Follow the installation instructions in the β€˜readme’ documentation provided with each fix pack or interim fix.

For Maximo Asset Management and Maximo Asset Management Essentials 7.5, 7.1, 6.2**(and for the above-referenced versions of Maximo for Government, Maximo for Nuclear Power, Maximo for Transportation, Maximo for Life Sciences, Maximo for Oil and Gas and Maximo for Utilities)****:**

VRMF Fix Pack or Interim Fix **Download **
7.5.0.6 Maximo 7.5.0.6 Interim Fix:
7.5.0.6-TIV-MAM-IFIX001 or latest Interim Fix available FixCentral
7.1.1.12 7.1.1.12 Interim Fix:
MBS_71112_IFIX.20140521-1147 or latest Interim Fix available Contact IBM Support
6.2.8 6.2.8 Interim Fix:
Latest Interim Fix available Contact IBM Support
**For SmartCloud Control Desk 7.5:**VRMF Fix Pack or Interim Fix **Download **
7.5.0.3 Maximo 7.5.0.6 Interim Fix:
7.5.0.6-TIV-MAM-IFIX001 or latest Interim Fix available FixCentral
7.5.1.2 Maximo 7.5.0.6 Interim Fix:
7.5.0.6-TIV-MAM-IFIX001 or latest Interim Fix available FixCentral
For Tivoli IT Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database 7.2, 7.1, 6.2****VRMF Fix Pack or Interim Fix **Download **
7.1.1.12 7.1.1.12 Interim Fix:
MBS_71112_IFIX.20140521-1147 or latest Interim Fix available Contact IBM Support
6.2.8 6.2.8 Interim Fix:
Latest Interim Fix available Contact IBM Support

If assistance is needed in determining the appropriate Fix Pack or Interim Fix level, contact IBM Technical Support. It is recommended that you always request the latest available Fix Pack or Interim Fix.

Due to the threat posed by a successful attack, IBM strongly recommends that customers apply fixes as soon as possible.

Workarounds and Mitigations

Until you apply the fixes, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack. Both approaches may break application functionality, so IBM strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

EPSS

0.001

Percentile

44.2%

Related for F09E2CE769CC450C4C8F0E813A45242614DD1095E04697EA3BC7D5A344674CFD