IBM Support

Security Bulletin: Static Credential Vulnerability in IBM Spectrum Protect Plus (CVE-2020-4854)

Security Bulletin


IBM Spectrum Protect Plus contains hard-coded credentials which could allow a remote attacker to gain elevated privileges. UPDATED: 24 February 2021 - Remediation/Fixes section updated with additional vSnap requirements for upgrading to 10.1.7. UPDATED: 23 April 2021 - Added 10.1.8 fix which eliminates the need to perform the additional steps that were required when upgrading to 10.1.7.

Vulnerability Details

CVEID:   CVE-2020-4854
DESCRIPTION:   IBM Spectrum Protect Plus contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
CVSS Base score: 7.5
CVSS Temporal Score: See: for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

Affected Product(s)Version(s)
IBM Spectrum Protect Plus10.1.0-10.1.6


Spectrum Protect
Plus Release
VRM Level
Link to Fix (see Note)


If you are upgrading to 10.1.7 the following additional steps are required.  These steps are NOT required if upgrading to 10.1.8.
For external vSnap servers, upgrade to version 10.1.7.

If you are using the internal vSnap on the IBM Spectrum Protect Plus server, upgrade it to version 10.1.7 and then migrate it to an external vSnap. Refer to detailed
instructions here:

If you are not using the internal vSnap, follow these steps.

  • First, uninstall the vSnap software: sudo yum remove vsnap
  • Next, delete the internal vsnap user: sudo userdel -r -f vsnap

Workarounds and Mitigations


Get Notified about Future Security Bulletins




This vulnerability was reported to IBM by Tenable

Change History

20 November 2020: Initial Publication
24 February 2021 - Updated Remediation/Fixes section with additonal vSnap requirements.
23 April 2021 - Updated Remediation/Fixes section with 10.1.8 which has removed the need to perform the additional that were required when upgrading to 10.1.7.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location


[{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SSNQFQ","label":"IBM Spectrum Protect Plus"},"Component":"","Platform":[{"code":"PF016","label":"Linux"}],"Version":"10.1.0-10.1.6","Edition":"","Line of Business":{"code":"LOB26","label":"Storage"}}]

Document Information

Modified date:
23 April 2021