IBM Support

Security Bulletin: User passwords might be obtained by a brute force attack on IBM® Intelligent Operations Center (CVE-2019-4067)

Security Bulletin


Summary

If your IBM® Intelligent Operations Center system is configured to use a Lightweight Directory Access Protocol (LDAP) user registry, user passwords might be obtained by a brute force attack that uses HTTP basic authentication requests to IBM Intelligent Operations Center.

Vulnerability Details

CVEID: CVE-2019-4067
DESCRIPTION: IBM Intelligent Operations Center does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/157012 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

This vulnerability affects the following products and versions:
  • IBM® Intelligent Operations Center V5.1.0 - V5.2.0
  • IBM® Intelligent Operations Center for Emergency Management V5.1.0 - V5.1.0.6
  • IBM® Water Operations for Waternamics V5.1.0 - V5.2.1.1

Remediation/Fixes

Workarounds and Mitigations

Ensure that your LDAP server is configured with a suitable Password Policy. For more information, see the troubleshooting document: User passwords might be obtained by a brute force attack on IBM® Intelligent Operations Center if your LDAP server does not have a secure Password Policy.

Get Notified about Future Security Bulletins

References

Off

Change History

31 May 2019: Original version published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SS3NGB","label":"IBM Intelligent Operations Center"},"Component":"Not Applicable","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"5.1.0;5.1.0.1;5.1.0.2;5.1.0.3;5.1.0.4;5.1.0.5;5.1.0.6;5.1.0.7;5.1.0.8;5.1.0.9;5.1.0.10;5.1.0.11;5.1.0.12;5.1.0.13;5.1.0.14;5.2.0","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Business Unit":{"code":"BU055","label":"Cognitive Applications"},"Product":{"code":"SSR3XR","label":"IBM Intelligent Operations Center for Emergency Management"},"Component":"","Platform":[{"code":"PF033","label":"Windows"}],"Version":"5.1.0;5.1.0.2;5.1.0.3;5.1.0.4;5.1.0.5;5.1.0.6","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SS8PY5","label":"IBM Water Operations for Waternamics"},"Component":"","Platform":[{"code":"PF016","label":"Linux"}],"Version":"5.1.0;5.2.0;5.2.0.1;5.2.0.2;5.2.0.3;5.2.0.4;5.2.0.5;5.2.0.6;5.2.1;5.2.1.1","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]

Document Information

Modified date:
31 May 2019

UID

ibm10880213