IBM Support

Security Bulletin: vCenter password disclosure via application tracing in IBM Tivoli Storage Manager Client and IBM Tivoli Storage Manager for Virtual Environments:Data Protection for VMware (CVE-2016-6110)

Security Bulletin


Summary

The IBM Tivoli Storage Manager Client may display the obfuscated VMware vCenter userID and password during VM backup with the INCLUDE.VMTSMVSS option when application tracing is enabled with VMTSMVSS flag. This problem only manifests when the Tivoli Storage Manager Client is used as the IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware data mover.

Vulnerability Details

CVEID: CVE-2016-6110
DESCRIPTION:
IBM Tivoli Storage Manager disclosed unencrypted login credentials to Vmware vCenter that could be obtained by a local user.
CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/118265 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)

Affected Products and Versions

This security exposure affects:

  • Tivoli Storage Manager (IBM Spectrum Protect) Client levels 7.1.0.0 through 7.1.6.3
  • Tivoli Storage Manager for Virtual Environments (IBM Spectrum Protect for Virtual Environments): Data Protection for VMware levels 7.1.0.0 through 7.1.6.3.

Remediation/Fixes

Tivoli Storage Manager Client Release

Fixing VRM LevelPlatformLink to Fix / Fix Availability Target
7.17.1.6.4Linux x86
Windows x64
http://www.ibm.com/support/docview.wss?uid=swg24042496

Tivoli Storage Manager for Virtual Environments: Data Protection for VMware ReleaseFixing VRM LevelPlatformLink to Fix / Fix Availability Target
7.17.1.6.4Linux
Windows
http://www.ibm.com/support/docview.wss?uid=swg24042520








Workarounds and Mitigations

Application tracing is disabled by default. It is normally enabled only when directed by IBM support to troubleshoot an issue.

To minimize exposure to this vulnerability, disable tracing unless required and delete trace files that are no longer needed.

Get Notified about Future Security Bulletins

References

Off

Change History

03 January 2017 - Original version published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSGSG7","label":"Tivoli Storage Manager"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":"Client","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"7.1","Edition":"All Editions","Line of Business":{"code":"LOB26","label":"Storage"}},{"Product":{"code":"SS8TDQ","label":"Tivoli Storage Manager for Virtual Environments"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":"Data Protection for VMware","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"7.1","Edition":"All Editions","Line of Business":{"code":"LOB26","label":"Storage"}}]

Document Information

Modified date:
17 June 2018

UID

swg21996198