IBM Support

Security Bulletin: IBM Tivoli Monitoring TEP Server vulnerabilities

Security Bulletin


Summary

By default, communications between the Tivoli Enterprise Portal client and server are not encrypted which can cause the following vulnerabilities.

Vulnerability Details

CVEID: CVE-2017-1181
DESCRIPTION:
 IBM Tivoli Monitoring Portal client could allow a local attacker to gain elevated privileges for IBM Tivoli Monitoring, caused by default console connection not being encrypted.
CVSS Base Score: 5.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123487 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2017-1183
DESCRIPTION:
 IBM Tivoli Monitoring Portal could allow a local (network adjacent) attacker to modify SQL commands to the Portal Server, when default client-server communications, HTTP, are being used.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123494 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2017-1182
DESCRIPTION:
 IBM Tivoli Monitoring Portal could allow a local (network adjacent) attacker to execute arbitrary commands on the system, when default client-server default communications, HTTP, are being used.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123493 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM Tivoli Portal Server (KCQ component) versions 6.2.2 Fix Pack 9, 6.2.3 through 6.2.3 Fix Pack 5 and 6.3.0 through 6.3.0 Fix Pack 7

Remediation/Fixes

The patches below update the default configuration for the Tivoli Enterprise Portal Server (kcq component)


Fix VRMF How to acquire fix
6.3.0-TIV-ITM-FP0007-IV96017 6.3.0 http://www.ibm.com/support/docview.wss?uid=swg24043856
6.2.3-TIV-ITM-FP0005-IV96017 6.2.3
6.2.2-TIV-ITM-FP0009-IV96017 6.2.2

Workarounds and Mitigations

The Tivoli Enterprise Portal server can be secured using existing product configuration settings as documented at the links below (Note: the documentation applies to all affected releases):


https://www.ibm.com/support/knowledgecenter/SSTFXA_6.3.0/com.ibm.itm.doc_6.3/install/ed_ssl.htm

Get Notified about Future Security Bulletins

References

Complete CVSS v3 Guide
On-line Calculator v3

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

Lukasz Mikula at ING Services Polska

Change History

11 May 2017 Draft Bulletin created
10 July 2017 Bulletin published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

ITM

Document information

More support for: IBM Tivoli Monitoring V6
ITM Tivoli Enterprise Portal V6

Software version: 6.2.2.9, 6.2.3.5, 6.3.0.7

Operating system(s): AIX, Linux, Windows

Reference #: 2003402

Modified date: 12 July 2017