var-201807-1683
Vulnerability from variot

The IMM2 First Failure Data Capture function collects management module logs and diagnostic information when a hardware error is detected. This information is made available for download through an SFTP server hosted on the IMM2 management network interface. In versions earlier than 4.90 for Lenovo System x and earlier than 6.80 for IBM System x, the credentials to access the SFTP server are hard-coded and described in the IMM2 documentation, allowing an attacker with management network access to obtain the collected FFDC data. After applying the update, the IMM2 will create random SFTP credentials for use with OneCLI. IMM2 Contains a vulnerability in the use of hard-coded credentials.Information may be obtained

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1683",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "flex system x880",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "system x3250 m6",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "system x3500 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "bladecenter hs22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3300 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3650 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3250 m5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "flex system x222 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "flex system x240 m5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "flex system x220 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3650 m4 bd",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "idataplex dx360 m4 water cooled",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3550 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "nextscale nx360 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3530 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3950 x6",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "bladecenter hs23",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3650 m4 hd",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3500 m5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "flex system x240 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3950 x6",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "flex system x880 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "flex system x440 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3630 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3650 m5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "system x3250 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3550 m5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "flex system x480 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "idataplex dx360 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3100 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3750 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "flex system x240 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "system x3100 m5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "flex system x480 x6",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "nextscale nx360 m5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "flex system x440 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "flex system x280 x6",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "flex system x280 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3850 x6",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "bladecenter hs23e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "system x3750 m4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.90"
      },
      {
        "model": "system x3850 x6",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.80"
      },
      {
        "model": "integrated management module",
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "integrated management module",
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008739"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-9068"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:ibm:integrated_management_module_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:lenovo:integrated_management_module_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008739"
      }
    ]
  },
  "cve": "CVE-2018-9068",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2018-9068",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-9068",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-9068",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-9068",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201807-1885",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008739"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1885"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-9068"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The IMM2 First Failure Data Capture function collects management module logs and diagnostic information when a hardware error is detected. This information is made available for download through an SFTP server hosted on the IMM2 management network interface. In versions earlier than 4.90 for Lenovo System x and earlier than 6.80 for IBM System x, the credentials to access the SFTP server are hard-coded and described in the IMM2 documentation, allowing an attacker with management network access to obtain the collected FFDC data. After applying the update, the IMM2 will create random SFTP credentials for use with OneCLI. IMM2 Contains a vulnerability in the use of hard-coded credentials.Information may be obtained",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-9068"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008739"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-9068",
        "trust": 2.4
      },
      {
        "db": "LENOVO",
        "id": "LEN-20227",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008739",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1885",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008739"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1885"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-9068"
      }
    ]
  },
  "id": "VAR-201807-1683",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.6817460383333334
  },
  "last_update_date": "2024-11-23T22:48:40.110000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "LEN-20227",
        "trust": 0.8,
        "url": "https://support.lenovo.com/us/en/solutions/LEN-20227"
      },
      {
        "title": "Lenovo System x  and IBM System x Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=82630"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008739"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1885"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-798",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008739"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-9068"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "https://support.lenovo.com/us/en/solutions/len-20227"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-9068"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-9068"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008739"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1885"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-9068"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008739"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1885"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-9068"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-008739"
      },
      {
        "date": "2018-07-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201807-1885"
      },
      {
        "date": "2018-07-26T19:29:00.487000",
        "db": "NVD",
        "id": "CVE-2018-9068"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-008739"
      },
      {
        "date": "2018-07-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201807-1885"
      },
      {
        "date": "2024-11-21T04:14:54.413000",
        "db": "NVD",
        "id": "CVE-2018-9068"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1885"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "IMM2 Vulnerabilities related to the use of hard-coded credentials",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008739"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1885"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.