IBM Support

Security Bulletin: IBM InfoSphere Information Server may be vulnerable to attacks based on privilege escalation

Security Bulletin


A potential vulnerability based on privilege escalation was addressed by IBM InfoSphere Information Server.

Vulnerability Details

CVEID:   CVE-2020-4347
DESCRIPTION:   IBM InfoSphere Information Server could be subject to attacks based on privilege escalation due to inappropriate file permissions for files used by WebSphere Application Server Network Deployment.
CVSS Base score: 7.3
CVSS Temporal Score: See: for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

Affected Product(s) Version
InfoSphere Information Server, Information Server on Cloud 11.7
InfoSphere Information Server, Information Server on Cloud 11.5
InfoSphere Information Server 11.3

If your Information Server installation uses WebSphere Application Server Network Deployment (WAS ND), it is affected if the following apply:

  • was initially installed using a umask weaker than 022
      Note that the install instructions indicate that umask 022 should be used.

                                           --  or  --
  • is Information Server version or versions 11.7.0.x, or such an installation was upgraded to a release after
           1. Versions 11.5 and 11.3 are not impacted until they are upgraded to version 11.7.
           2. A new installation of version (or later) is not impacted.


You should do the following steps (only needed once over the lifetime of the installation):

   Stand-alone deployment
   1.  In your WAS ND location, change directory to the directory containing the java folder.
   2.  chmod -R 755 java

   Cluster deployment
   1.  On the machine where your deployment manager is installed
        a.  change directory to the directory containing the java folder within your WAS ND installation
        b.  chmod -R 755 java

   2.  On a machine where a custom profile is installed
        a.  change directory to the directory containing the java folder within your WAS ND installation
        b.  chmod -R 755 java

   3.  Repeat step 2 for each custom profile, and horizontal machine that is a member of the cluster.

Workarounds and Mitigations

see Remediation/Fixes section.

Get Notified about Future Security Bulletins




The vulnerability was reported to IBM by Ashneel Prasad.

Change History

15 April 2020: Initial Publication
17 April 2020: Added acknowledgement
20 April 2020: Added versions 11.7.x.x as impacted irrespective of umask setting
08 July 2020: New installations of or later are not impacted

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location


[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SSZJPZ","label":"IBM InfoSphere Information Server"},"Component":"","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"11.7; 11.5; 11.3","Edition":"","Line of Business":{"code":"LOB10","label":"Data and AI"}}]

Document Information

Modified date:
08 July 2020