IBM Spectrum Protect Plus contains hard-coded credentials which could allow a remote attacker to gain elevated privileges. UPDATED: 24 February 2021 - Remediation/Fixes section updated with additional vSnap requirements for upgrading to 10.1.7. UPDATED: 23 April 2021 - Added 10.1.8 fix which eliminates the need to perform the additional steps that were required when upgrading to 10.1.7.
DESCRIPTION: IBM Spectrum Protect Plus contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/190454 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Products and Versions
|IBM Spectrum Protect Plus||10.1.0-10.1.6|
|Platform||APAR ||Link to Fix|
|10.1||10.1.7 (see Note)||Linux||None||https://www.ibm.com/support/pages/node/6330495|
If you are upgrading to 10.1.7 the following additional steps are required. These steps are NOT required if upgrading to 10.1.8.
For external vSnap servers, upgrade to version 10.1.7.
If you are using the internal vSnap on the IBM Spectrum Protect Plus server, upgrade it to version 10.1.7 and then migrate it to an external vSnap. Refer to detailed
instructions here: https://www.ibm.com/support/knowledgecenter/en/SSNQFQ_10.1./spp/t_spp_migrating_vsnap_data_to_standalone_vsnap.html
If you are not using the internal vSnap, follow these steps.
- First, uninstall the vSnap software: sudo yum remove vsnap
- Next, delete the internal vsnap user: sudo userdel -r -f vsnap
Workarounds and Mitigations
Get Notified about Future Security Bulletins
This vulnerability was reported to IBM by Tenable
20 November 2020: Initial Publication
24 February 2021 - Updated Remediation/Fixes section with additonal vSnap requirements.
23 April 2021 - Updated Remediation/Fixes section with 10.1.8 which has removed the need to perform the additional that were required when upgrading to 10.1.7.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
23 April 2021