Security Bulletin
Summary
IBM Spectrum Protect Plus contains hard-coded credentials which could allow a remote attacker to gain elevated privileges. UPDATED: 24 February 2021 - Remediation/Fixes section updated with additional vSnap requirements for upgrading to 10.1.7. UPDATED: 23 April 2021 - Added 10.1.8 fix which eliminates the need to perform the additional steps that were required when upgrading to 10.1.7.
Vulnerability Details
CVEID: CVE-2020-4854
DESCRIPTION: IBM Spectrum Protect Plus contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/190454 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Products and Versions
Affected Product(s) | Version(s) |
IBM Spectrum Protect Plus | 10.1.0-10.1.6 |
Remediation/Fixes
Spectrum Protect Plus Release | Fixing VRM Level | Platform | APAR | Link to Fix |
10.1 | 10.1.7 (see Note) | Linux | None | https://www.ibm.com/support/pages/node/6330495 |
10.1 | 10.1.8 | Linux | IT35746 | https://www.ibm.com/support/pages/node/6415111 |
NOTE:
If you are upgrading to 10.1.7 the following additional steps are required. These steps are NOT required if upgrading to 10.1.8.
For external vSnap servers, upgrade to version 10.1.7.
If you are using the internal vSnap on the IBM Spectrum Protect Plus server, upgrade it to version 10.1.7 and then migrate it to an external vSnap. Refer to detailed
instructions here: https://www.ibm.com/support/knowledgecenter/en/SSNQFQ_10.1./spp/t_spp_migrating_vsnap_data_to_standalone_vsnap.html
If you are not using the internal vSnap, follow these steps.
- First, uninstall the vSnap software: sudo yum remove vsnap
- Next, delete the internal vsnap user: sudo userdel -r -f vsnap
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Acknowledgement
This vulnerability was reported to IBM by Tenable
Change History
20 November 2020: Initial Publication
24 February 2021 - Updated Remediation/Fixes section with additonal vSnap requirements.
23 April 2021 - Updated Remediation/Fixes section with 10.1.8 which has removed the need to perform the additional that were required when upgrading to 10.1.7.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
23 April 2021
UID
ibm16367823