IBM Support

Security Bulletin: BigFix deployments with internet-facing relays that are not configured as authenticating are prone to security threats (CVE-2019-4061)

Security Bulletin


Internet-facing relays, if any, in a BigFix deployment might be configured as non-authenticating, which exposes the deployment to security risks. Security attacks in this context might mean unauthorized access to the relays and any content or actions, and download packages associated with them or to the Relay Diagnostics page that might contain sensitive information (for example: software, vulnerability information, and passwords).

Vulnerability Details

CVEID: CVE-2019-4061
DESCRIPTION: IBM BigFix Platform could allow an attacker to query the relay remotely and gather information about the updates and fixlets deployed to the associated sites due to not enabling authenticated access.
CVSS Base Score: 5.3
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Affected IBM BigFix Platform

Affected Versions
BigFix Platform
9.5 - 9.5.11
BigFix Platform
9.2 - 9.2.16


Note: The following procedure applies to both 9.2.x and 9.5.x.

To remediate the security vulnerability, configure the internet-facing relays in your BigFix deployment as "authenticating".  When a relay is configured as authenticating, only the BigFix clients in your environment can connect to it and all the communication between them happens through TLS (HTTPS). This configuration also prevents any unauthorized access to the Relay Diagnostics page.

To enable the relays in your environment for authentication, do the following steps:

  1. On the BES Support website, find the BES Client Settings: Enable Relay authentication fixlet.
  2. Run the fixlet and wait for the action to finish. 

For more details, see   Authenticating Relays .

CVE-to-Component Breakdown


Affected Components


Internet-facing relays, if any.

Workarounds and Mitigations

Using firewall rules to restrict access to a specific IP range or VPN-based connection management can limit the exposure. Note that a skilled attacker may still be able to overcome these restrictions through spoofing or gaining access to other machines on the trusted network.

Get Notified about Future Security Bulletins


Complete CVSS v2 Guide
On-line Calculator v2

Complete CVSS v3 Guide
On-line Calculator v3

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog


Ryan Hanson, Chris Bellows, and HD Moore of Atredis Partners

Change History

2019-02-12: Added CVE/CVSS details, added mitigation steps.
2019-02-04: Original version published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document information

More support for: IBM BigFix Platform

Component: Not Applicable

Software version: 9.2, 9.5

Operating system(s): Platform Independent

Reference #: 0870242

Modified date: 18 February 2019