fkie_cve-2016-8937
Vulnerability from fkie_nvd
Published
2017-10-05 17:29
Modified
2024-11-21 03:00
Severity ?
Summary
The IBM Tivoli Storage Manager (IBM Spectrum Protect 7.1 and 8.1) default authentication protocol is vulnerable to a brute force attack due to disclosing too much information during authentication. An attacker could gain user or administrative access to the TSM server. IBM X-Force ID: 118750.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | http://www.ibm.com/support/docview.wss?uid=swg22007935 | Patch, Vendor Advisory | |
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/118750 | VDB Entry, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg22007935 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/118750 | VDB Entry, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "E11F79C4-D61F-481B-9BDC-ADEDE1494AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "76EC7D2D-4B0A-4CDF-A523-85ABEF05D211", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2C7DD9CE-0E95-45BB-9BB5-07652C9FD6C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6F3F3288-4280-43DA-B6E4-8240137105AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "90CAA216-D0B3-4ECB-8BBE-5288DE590DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "10524DD7-E9F2-498C-93F1-54F2C47AAEBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "863D87DB-64FD-4C97-9CAD-48ED2A298FA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "295AD957-904D-4917-BCDD-27E5E4AD9E27", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DF7DA554-D2AE-45FF-AEB9-551F9AD9C9B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "C05C02E3-24CC-496C-912E-951A1541F7AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "45172E20-5E12-435E-815F-D543C9B6BD41", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "9625017C-311D-423A-BFF8-AEB4CE7766FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "3538EBB1-A960-4CE7-B07D-17CAFF9F3564", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "19A53C1A-0B43-4EB8-B489-742AAD1D4379", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "92592FF3-70F2-4C48-A2A0-C5C8E8DCC649", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "DF7A543F-FD79-42C8-9DAF-2DD549926DDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "5A018347-E8E9-4CCC-B118-247D9064D768", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D406098E-B724-4E5F-8B47-60B4FAE1B6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "3707B2DD-1855-4094-B0B5-C1204EBB221C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "122C35D5-BF80-4DE4-861D-C7D6D4D56777", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "581F420E-BBA2-4302-B8A1-ED8BFE78155E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "26CE2C13-53F7-4A4D-9DDC-0E00B0263858", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "5BEFCB76-C69E-4168-9A2E-A258B7E44F23", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "7687A0AB-E864-4E23-8A5F-54AD38A69B84", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F35C20CF-CB82-46D7-A4D0-FFD277B7ECB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4B27F038-ADB0-4052-8264-C0816194DB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "9D8E5AD5-EDF3-432E-A7F8-0D3E9ED91033", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.6.100:*:*:*:*:*:*:*", "matchCriteriaId": "E9340DA0-29B3-4173-B2FB-F5FC5E99AC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC9CE1A-7416-4F41-8699-693C161D8EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F85BEAE-8583-4499-A06D-741C7528DFE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "8092D853-0E6D-4104-B85B-92132D925DA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.100:*:*:*:*:*:*:*", "matchCriteriaId": "AFD1F7B4-13EF-4CE4-807E-95249EAA3C62", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.200:*:*:*:*:*:*:*", "matchCriteriaId": "DF714DF6-15DF-4BFD-A4F9-E9E9E333CFE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.500:*:*:*:*:*:*:*", "matchCriteriaId": "069216F4-33F0-404C-8D39-B9D07F9CB4D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.600:*:*:*:*:*:*:*", "matchCriteriaId": "7BAF55EE-E8B0-4715-B350-1A359B58AF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "906D67F5-DEC8-464D-BC4D-BAF223E72C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1A60ADB-D0D9-413D-96A7-4BFDF494CC75", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "212B26BB-0A19-41EB-811C-04C765374E8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1..5.100:*:*:*:*:*:*:*", "matchCriteriaId": "2C934CA2-8606-479E-AA9F-AB70E7BB30FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "53CF0089-B81D-4738-85AC-E728DF77FBAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CF39AAEE-2FC3-4ACC-AEF7-6E12EEEF0BCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C71F01C8-C1BB-4E93-8AE8-A1B5131310B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C59C16BD-1CB8-47BB-8352-B1609798BB0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB3B365E-0505-4A43-90A6-811D39BB6262", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B880E34D-A9B4-4A64-B734-71ADC0588761", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "E6A07C8F-4DD0-4767-8A8F-A1721EBDE583", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.200:*:*:*:*:*:*:*", "matchCriteriaId": "5D972077-A132-430D-97E6-8F0F8B0F79B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.300:*:*:*:*:*:*:*", "matchCriteriaId": "4DC78448-7AD8-438B-8AFC-79B31FB706D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C3B578C6-A29A-41B6-A9B6-F7A08D9BE34B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.000:*:*:*:*:*:*:*", "matchCriteriaId": "6FC3FEDA-B353-4C31-A349-1A12F4FAF465", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E8CA94D1-06FB-4C94-83FB-2BC52676BBDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "302756E5-F3E8-4F5E-90EA-A81A88DB55AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.100:*:*:*:*:*:*:*", "matchCriteriaId": "D92EDDEE-1135-4EE7-972E-19471352E0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7C980FE7-8B2D-4ED4-A5BF-78615AD0F596", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD269C39-1070-44C3-B7FC-968C12A344E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F7AACC13-50CF-4229-B204-E30523A38721", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "1AC65208-F124-4D28-B5D8-3A3C774C82A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5.200:*:*:*:*:*:*:*", "matchCriteriaId": "E782420B-2A62-4537-88EB-1169C73AC21B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "998D4B2B-7563-4885-994F-D9F56D62F888", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "834EBEBA-70E1-4089-A064-6BBFAD50D1CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.7.100:*:*:*:*:*:*:*", "matchCriteriaId": "4717F07E-B1B0-4F90-9ECF-DD08E3E94D66", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.7.200:*:*:*:*:*:*:*", "matchCriteriaId": "13B7B79B-C85C-4CF6-BBBF-DB00D857BC13", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF6D9FD2-9DD0-40E1-AD3D-A5ACBF7601DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AEB2B65F-A847-47E9-85D9-C42EC7F7F901", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:8.1.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "0587F4BC-4B77-42A1-BA13-296C6CD41355", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IBM Tivoli Storage Manager (IBM Spectrum Protect 7.1 and 8.1) default authentication protocol is vulnerable to a brute force attack due to disclosing too much information during authentication. An attacker could gain user or administrative access to the TSM server. IBM X-Force ID: 118750." }, { "lang": "es", "value": "El protocolo de autenticaci\u00f3n por defecto de IBM Tivoli Storage Manager (IBM Spectrum Protect 7.1 y 8.1) es vulnerable a ataques de fuerza bruta ya que revela demasiada informaci\u00f3n durante el proceso de autenticaci\u00f3n. Un atacante podr\u00eda obtener acceso administrativo o de usuario al servidor TSM. IBM X-Force ID: 118750." } ], "id": "CVE-2016-8937", "lastModified": "2024-11-21T03:00:20.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-05T17:29:00.217", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22007935" }, { "source": "psirt@us.ibm.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/118750" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22007935" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/118750" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.