IBM Support

Security Bulletin: Static Credential Vulnerability in IBM Spectrum Protect Plus (CVE-2020-4854)

Security Bulletin


Summary

IBM Spectrum Protect Plus contains hard-coded credentials which could allow a remote attacker to gain elevated privileges. UPDATED: 24 February 2021 - Remediation/Fixes section updated with additional vSnap requirements for upgrading to 10.1.7. UPDATED: 23 April 2021 - Added 10.1.8 fix which eliminates the need to perform the additional steps that were required when upgrading to 10.1.7.

Vulnerability Details

CVEID:   CVE-2020-4854
DESCRIPTION:   IBM Spectrum Protect Plus contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/190454 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

Affected Product(s)Version(s)
IBM Spectrum Protect Plus10.1.0-10.1.6

Remediation/Fixes

Spectrum Protect
Plus Release
Fixing
VRM Level
PlatformAPAR
Link to Fix
      10.110.1.7 (see Note)
LinuxNone
https://www.ibm.com/support/pages/node/6330495
      10.1
10.1.8
Linux
IT35746
https://www.ibm.com/support/pages/node/6415111


NOTE:


If you are upgrading to 10.1.7 the following additional steps are required.  These steps are NOT required if upgrading to 10.1.8.
 
For external vSnap servers, upgrade to version 10.1.7.

If you are using the internal vSnap on the IBM Spectrum Protect Plus server, upgrade it to version 10.1.7 and then migrate it to an external vSnap. Refer to detailed
instructions here: https://www.ibm.com/support/knowledgecenter/en/SSNQFQ_10.1./spp/t_spp_migrating_vsnap_data_to_standalone_vsnap.html

If you are not using the internal vSnap, follow these steps.

  • First, uninstall the vSnap software: sudo yum remove vsnap
  • Next, delete the internal vsnap user: sudo userdel -r -f vsnap

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

This vulnerability was reported to IBM by Tenable

Change History

20 November 2020: Initial Publication
24 February 2021 - Updated Remediation/Fixes section with additonal vSnap requirements.
23 April 2021 - Updated Remediation/Fixes section with 10.1.8 which has removed the need to perform the additional that were required when upgrading to 10.1.7.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location

Worldwide

[{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"SSNQFQ","label":"IBM Spectrum Protect Plus"},"Component":"","Platform":[{"code":"PF016","label":"Linux"}],"Version":"10.1.0-10.1.6","Edition":"","Line of Business":{"code":"LOB26","label":"Storage"}}]

Document Information

Modified date:
23 April 2021

UID

ibm16367823