IBM Support

Security Bulletin: Security Vulnerabilties exist in IBM Cognos Controller

Security Bulletin


Security Vulnerabilities exist in IBM Cognos Controller.

When performing security testing, you might encounter a "Missing Secure Attribute in Encrypted Session (SSL) Cookie" error message. IBM Cognos Controller versions 10.4.1, 10.4.0, 10.3.1 and 10.3.0, by default, do not have this setting enabled. If this attribute is not set, it may be possible to steal user and session information (cookies) that was sent during an encrypted session.

The Lucky 13 attack is a crystallographic timing attack against implementations of the Transport Layer Security (TLS) protocol that use the CBC mode of operation. An attacker could perform man in the middle attacks to successfully obtain plain text from the secure channel. IBM Cognos Controller versions 10.4.1 and 10.4.0 could be vulnerable to this attack.

Both vulnerabilities can be addressed by implementing the fix referenced below.

Vulnerability Details

The following vulnerability affects IBM Cognos Controller 10.4.1 and 10.4.0 only:
CVEID: CVE-2019-4175
DESCRIPTION: IBM Cognos Controller uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
CVSS Base Score: 5.9
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
The following vulnerability affects Cognos Controller 10.4.1, 10.4.0, 10.3.1 and 10.3.0:
CVEID: CVE-2019-4171
DESCRIPTION: IBM Cognos Controller does not set the secure attribute on authorization tokens or session cookies. This could allow an attacker to obtain sensitive information using man in the middle techniques.
CVSS Base Score: 3.7
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM Cognos Controller 10.4.1
IBM Cognos Controller 10.4.0
IBM Cognos Controller 10.3.1
IBM Cognos Controller 10.3.0


See Workarounds and Mitigations below

Workarounds and Mitigations

Please implement the fix referenced below:
Please note: the same configuration steps apply to all applicable versions.

Get Notified about Future Security Bulletins



Change History

Original Version Published: September 9, 2019

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location


[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SS9S6B","label":"IBM Cognos Controller"},"Component":"","Platform":[{"code":"PF033","label":"Windows"}],"Version":"10.4.1, 10.4.0, 10.3.1, 10.3.0","Edition":"","Line of Business":{"code":"LOB10","label":"Data and AI"}}]

Document Information

Modified date:
09 September 2019