IBM Support

Security Bulletin: Security Identity Adapter data traffic to/from server is not encrypted by default

Security Bulletin


Summary

Security Identity Adapter data traffic to/from IGI and ISIM server is not encrypted by default. Adapter installers have been updated to enable SSL by default. The customer can choose during installation to disable SSL. Note that keeping the SSL enablement option requires certificates to be imported.

Vulnerability Details

CVEID: CVE-2017-1362

DESCRIPTION:
IBM Security Identity Adapters store user credentials in the plain, which can be read by a local user. If the adapter SSL option is not explicitly enabled during installation, the adapters transmit data, including user credentials, to IGI or the ISIM Server in clear text.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/126801 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

IBM Security Identity Manager v6.0 Adapters
Security Identity Adapters v7.x for ISIM 7.0, IGI 5.2.x, and PIM 2.x

Remediation/Fixes

Obtain the latest GA levels of 6.0 or 7.x adapters, as found on the Fix Link pages listed below:

Product

Fix Link
ISIM v6.0 AdaptersAdapters for IBM Security Identity Manager v6.0
Security Identity v7.x Adapters for IGI, ISIM, PIMIBM Security Identity Adapters

Workarounds and Mitigations

Choose SSL enablement when installing Security Identity Adapters. Note that you must have valid certificates imported in both the adapter and server in order for SSL communication between them to succeed.

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

IBM X-Force Ethical Hacking Team: Ron Craig, Warren Moynihan, Jonathan Fitz-Gerald, John Zuccato, Rodney Ryan, Chris Shepherd, Dmitriy Beryoza

Change History

21 September 2017: First publish

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSRMWJ","label":"IBM Security Identity Manager"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"Adapters","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"},{"code":"PF010","label":"HP-UX"},{"code":"PF035","label":"z\/OS"}],"Version":"6.0;7.0","Edition":"","Line of Business":{"code":"LOB24","label":"Security Software"}}]

Document Information

Modified date:
16 June 2018

UID

swg22007381