IBM Support

Security Bulletin: IBM Tivoli Monitoring Client Vulnerabilities

Security Bulletin


IBM Tivoli Monitoring Client is affected by user privilege escalation and possible denial of service vulnerabilities. IBM has addressed these vulnerabilities.

Vulnerability Details

CVEID: CVE-2017-1794
DESCRIPTION: IBM Tivoli Monitoring Enterprise Portal is vulnerable to both TEPS user privilege escalation and possible denial of service due to unconstrained memory growth.
CVSS Base Score: 7.5
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM Tivoli Monitoring Enterprise Portal Server versions 6.2.3 through 6.2.3 Fix Pack 5 and 6.3.0 through 6.3.0 Fix Pack 7


The patches below update the IBM Tivoli Monitoring Enterprise Portal Server

Fix VRMF How to acquire fix
6.3.0-TIV-ITM-FP0007-IJ09127 6.3.0
6.2.3-TIV-ITM-FP0005-IJ09127 6.2.3

Workarounds and Mitigations

Using the default IIOP or Corba plus SSL avoids the vulnerabilites as it does not use the same interfaces which have been shown to be vulnerable as per the CVE above. The following security bulletin ensures that default IIOP is using SSL:

Get Notified about Future Security Bulletins




This vulnerability was disclosed to IBM by Emanuele Bartoli of Verizon.

Change History

02/27/2018 Draft Document Created

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SSTFXA","label":"Tivoli Monitoring"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"ITM Tivoli Enterprise Portal V6","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":";;;;;;;6.3.0;;;;;;6.2.3","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
17 September 2018