IBM Support

Security Bulletin: IBM Tivoli Monitoring TEP Server vulnerabilities

Security Bulletin


Summary

By default, communications between the Tivoli Enterprise Portal client and server are not encrypted which can cause the following vulnerabilities.

Vulnerability Details

CVEID: CVE-2017-1181
DESCRIPTION:
 IBM Tivoli Monitoring Portal client could allow a local attacker to gain elevated privileges for IBM Tivoli Monitoring, caused by default console connection not being encrypted.
CVSS Base Score: 5.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123487 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)


CVEID: CVE-2017-1183
DESCRIPTION:
 IBM Tivoli Monitoring Portal could allow a local (network adjacent) attacker to modify SQL commands to the Portal Server, when default client-server communications, HTTP, are being used.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123494 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2017-1182
DESCRIPTION:
 IBM Tivoli Monitoring Portal could allow a local (network adjacent) attacker to execute arbitrary commands on the system, when default client-server default communications, HTTP, are being used.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123493 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM Tivoli Portal Server (KCQ component) versions 6.2.2 Fix Pack 9, 6.2.3 through 6.2.3 Fix Pack 5 and 6.3.0 through 6.3.0 Fix Pack 7

Remediation/Fixes

The patches below update the default configuration for the Tivoli Enterprise Portal Server (kcq component)


FixVRMFHow to acquire fix
6.3.0-TIV-ITM-FP0007-IV960176.3.0http://www.ibm.com/support/docview.wss?uid=swg24043856
6.2.3-TIV-ITM-FP0005-IV960176.2.3
6.2.2-TIV-ITM-FP0009-IV960176.2.2

Workarounds and Mitigations

The Tivoli Enterprise Portal server can be secured using existing product configuration settings as documented at the links below (Note: the documentation applies to all affected releases):


https://www.ibm.com/support/knowledgecenter/SSTFXA_6.3.0/com.ibm.itm.doc_6.3/install/ed_ssl.htm

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

Lukasz Mikula at ING Services Polska

Change History

11 May 2017 Draft Bulletin created
10 July 2017 Bulletin published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSTFXA","label":"Tivoli Monitoring"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"ITM Tivoli Enterprise Portal V6","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"6.3.0.7;6.2.3.5;6.2.2.9","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Product Synonym

ITM

Document Information

Modified date:
17 June 2018

UID

swg22003402