The IBM Data Protection Extension in the VMware GUI component of IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (IBM Spectrum Protect for Virtual Environments) and IBM Tivoli Storage FlashCopy Manager for VMware (IBM Spectrum Protect Snapshot) are subject to a privilege escalation vulnerability that can result in an authenticated user being able to restore a virtual machine even though the user does not have the required privilege for this operation.
DESCRIPTION: The IBM Data Protection Extension in the Tivoli Storage Manager and FlashCopy Manager Data Protection for VMware GUI has a privilege escalation vulnerability. When the IBM Data Protection Extension is installed in the VMware vSphere Web Client GUI, it is possible for an authenticated user to select an existing virtual machine from the vSphere inventory and perform a Restore operation even though the user does not have the required privilege for the operation. The restore operation will not overwrite the existing virtual machine, but instead will create a new virtual machine with the same data as the existing virtual machine. After the restore creates the new virtual machine, the user can access its unencrypted data, regardless of their access permissions to the existing virtual machine data.
CVSS Base Score: 8.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107858 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)
Affected Products and Versions
The affected GUI is part of the following products and versions:
- Tivoli Storage Manager for Virtual Environments: Data Protection for VMware 18.104.22.168 through 7.1.3.x
- Tivoli Storage FlashCopy Manager for VMware 22.214.171.124 through 4.1.3.x
Tivoli Storage Manager for VE: Data Protection for VMware Release
|First Fixing VRMF Level|
|Link to Fix / Fix Availability Target|
|Tivoli Storage |
FlashCopy Manager for VMware Release
First Fixing VRMF Level
Link to Fix / Fix Availability Target
Workarounds and Mitigations
Get Notified about Future Security Bulletins
11 December 2015 - Bulletin initially published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
17 June 2018