A vulnerability exists in the IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware GUI (IBM Spectrum Protect™ for Virtual Environments) where an authenticated user can execute GUI functions that require the Tivoli Storage Manager administrative credentials without having these credentials.
DESCRIPTION: A vulnerability exists in the IBM Tivoli Storage Manager (IBM Spectrum Protect) for Virtual Environments Data Protection for VMware GUI where in limited cases it is possible for authenticated users to execute GUI functions that require the Tivoli Storage Manager(TSM) administrative credentials without having these credentials. After authenticating to the DP for VMware GUI, the user could exercise TSM administrative functions such as Backup Scheduling and Configuration Tasks that they otherwise would not be permitted to use. The vulnerability only applies in configurations where TSM administrative ID credentials have not been stored in the DP for VMware GUI configuration for use by all users. In order to exploit, multiple users must be logged-in to the DP for VMware GUI at the same time, and the exploiter has to be willing to take a malicious action even though they are identifiable from their login credentials.
CVSS Base Score: 8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/114050 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H)
Affected Products and Versions
The following levels of IBM Tivoli Storage Manger for Virtual Environments: Data Protection for VMware (IBM Spectrum Protect for Virtual Environments) are affected:
- 126.96.36.199 through 7.1.4.x
- 188.8.131.52 through 184.108.40.206
Tivoli Storage Manager for VE: Data Protection for VMware Release
|First Fixing VRMF Level||Client|
|Link to Fix / Fix Availability Target|
Workarounds and Mitigations
Get Notified about Future Security Bulletins
22 August 2016 - Original version published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
17 June 2018