The IBM Tivoli Storage Manager Client may display the obfuscated VMware vCenter userID and password during VM backup with the INCLUDE.VMTSMVSS option when application tracing is enabled with VMTSMVSS flag. This problem only manifests when the Tivoli Storage Manager Client is used as the IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware data mover.
DESCRIPTION: IBM Tivoli Storage Manager disclosed unencrypted login credentials to Vmware vCenter that could be obtained by a local user.
CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/118265 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)
Affected Products and Versions
This security exposure affects:
- Tivoli Storage Manager (IBM Spectrum Protect) Client levels 22.214.171.124 through 126.96.36.199
- Tivoli Storage Manager for Virtual Environments (IBM Spectrum Protect for Virtual Environments): Data Protection for VMware levels 188.8.131.52 through 184.108.40.206.
Tivoli Storage Manager Client Release
|Fixing VRM Level||Platform||Link to Fix / Fix Availability Target|
|Tivoli Storage Manager for Virtual Environments: Data Protection for VMware Release||Fixing VRM Level||Platform||Link to Fix / Fix Availability Target|
Workarounds and Mitigations
Application tracing is disabled by default. It is normally enabled only when directed by IBM support to troubleshoot an issue.
To minimize exposure to this vulnerability, disable tracing unless required and delete trace files that are no longer needed.
Get Notified about Future Security Bulletins
03 January 2017 - Original version published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
17 June 2018