Security Bulletin: A vulnerability in the IBM BixFix Platform could allow passwords to be transmitted in clear text (CVE-2016-0292, CVE-2016-0397)
Web Reports/BigFix Platform passwords are transmitted in clear text by default. WebReports should be configured to use HTTPS
CVE ID: CVE-2016-0292
DESCRIPTION: BigFix WebReports could allow a local user to obtain the system password stored in BigFix web reports in clear text.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/111303 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVE ID: CVE-2016-0397
DESCRIPTION: The IBM BigFix platform transmits some limited sensitive information in clear text that could allow a remote attacker to obtain the information over the network using traffic sniffing devices.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/112646 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
Affected Products and Versions
9.0, 9.1, 9.2, 9.5
This vulnerability is remediated by setting WebReports to use HTTPS instead of HTTP, which has not been the default.
There are 2 scenarios to consider: i. fresh installation and ii.existing installation.
For the fresh install scenario, the fix allows the user to configure WebReports to use HTTPS at installation time. This fix has been applied to 9.5 (9.5.2).
For the existing installation scenario, instructions are provided to manually configure it.
Considering that the fresh installation scenario doesn't apply to 9.0, 9.1 and 9.2, for these releases instructions are provided to configure the check. Existing 9.5 installations can also configure the fix as per below.
BigFix 9.5 (new install):
To remediate this vulnerability when doing a fresh install, please use BigFix 9.5.2 or greater and you will see messages allowing the choice to set up HTTPS for WebReports.
Please note that product previously referred to as Tivoli Endpoint Manager and/or IBM Endpoint Manager and/or IBM BigFix Endpoint Manager are all previous names for the same product, and which is now referred to as IBM Bigfix. The underlying product is still the same and only the name has been changed.
Workarounds and Mitigations
For existing installations of BigFix 9.0, 9.1, 9.2 and 9.5.0:
To remediate this vulnerability please configure WebReports to use HTTPS. The port 8083 can be used as a default port and a self-signed certificate should be created for the WebReports host and saved into INSTALLDIR/BESReportsData/SelfWRCertificate.pem. The redirect from the port
8080 should be enabled.
Get Notified about Future Security Bulletins
8 July 2016: Original version published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
More support for:
IBM BigFix Platform
Software version: 9.0, 9.1, 9.2, 9.5
Operating system(s): Platform Independent
Software edition: Edition Independent
Reference #: 1985907
Modified date: 04 August 2016