IBM Support

Security Bulletin: Apache Tomcat vulnerability affects IBM Storwize V7000 Unified (CVE-2019-4293)

Security Bulletin


This vulnerability may allow attacker to reveal the third party software Apache Tomcat Web server version.

Vulnerability Details

CVEID: CVE-2019-4293
DESCRIPTION: IBM System Storage Storwize V7000 Unified (V7000U) configuration may allow an attacker to reveal the server version in default installation, which could be used in further attacks against the system.
CVSS Base Score: 5.3
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM Storwize V7000 Unified
The product is affected when running code releases from v1.6.0.0 to v1.6.2.5.


A fix for these issues is in version v1.6.2.6 of IBM Storwize V7000 Unified.  Customers running an affected version of IBM Storwize V7000 Unified should upgrade to or a later version.

Latest Storwize V7000 Unified Software

Systems running an unsupported version (v1.5 or earlier) should be upgraded to the current release containing the security fixes.

Please contact IBM support for assistance in upgrading your system.

Workarounds and Mitigations


Get Notified about Future Security Bulletins



*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Internal Use Only

PR - 135320

[{"Product":{"code":"ST5Q4U","label":"IBM Storwize V7000 Unified (2073-700)"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":"1.6","Platform":[{"code":"","label":"IBM Storwize V7000"}],"Version":"1.6","Edition":"","Line of Business":{"code":"","label":""}}]

Document Information

Modified date:
17 May 2019