IBM Support

Security Bulletin: A vulnerability in the IBM BixFix Platform could allow passwords to be transmitted in clear text (CVE-2016-0292, CVE-2016-0397)

Security Bulletin


Web Reports/BigFix Platform passwords are transmitted in clear text by default. WebReports should be configured to use HTTPS

Vulnerability Details

CVE ID: CVE-2016-0292
BigFix WebReports could allow a local user to obtain the system password stored in BigFix web reports in clear text.
CVSS Base Score: 6.2
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVE ID: CVE-2016-0397
The IBM BigFix platform transmits some limited sensitive information in clear text that could allow a remote attacker to obtain the information over the network using traffic sniffing devices.
CVSS Base Score: 3.7
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

9.0, 9.1, 9.2, 9.5


This vulnerability is remediated by setting WebReports to use HTTPS instead of HTTP, which has not been the default.

There are 2 scenarios to consider: i. fresh installation and ii.existing installation.

For the fresh install scenario, the fix allows the user to configure WebReports to use HTTPS at installation time. This fix has been applied to 9.5 (9.5.2).

For the existing installation scenario, instructions are provided to manually configure it.

Considering that the fresh installation scenario doesn't apply to 9.0, 9.1 and 9.2, for these releases instructions are provided to configure the check. Existing 9.5 installations can also configure the fix as per below.

BigFix 9.5 (new install):

To remediate this vulnerability when doing a fresh install, please use BigFix 9.5.2 or greater and you will see messages allowing the choice to set up HTTPS for WebReports.

Please note that product previously referred to as Tivoli Endpoint Manager and/or IBM Endpoint Manager and/or IBM BigFix Endpoint Manager are all previous names for the same product, and which is now referred to as IBM Bigfix. The underlying product is still the same and only the name has been changed.

Workarounds and Mitigations

For existing installations of BigFix 9.0, 9.1, 9.2 and 9.5.0:

To remediate this vulnerability please configure WebReports to use HTTPS. The port 8083 can be used as a default port and a self-signed certificate should be created for the WebReports host and saved into INSTALLDIR/BESReportsData/SelfWRCertificate.pem. The redirect from the port
8080 should be enabled.

Get Notified about Future Security Bulletins


Related information

Change History

8 July 2016: Original version published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document information

More support for: IBM BigFix Platform

Software version: 9.0, 9.1, 9.2, 9.5

Operating system(s): Platform Independent

Software edition: Edition Independent

Reference #: 1985907

Modified date: 04 August 2016