CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
65.5%
IBM Tivoli Monitoring (ITM) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, 6.2.3 through FP05, and 6.3.0 before FP04 allows remote authenticated users to bypass intended access restrictions and execute arbitrary commands by leveraging Take Action view authority to modify in-progress commands.
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | tivoli_monitoring | 6.2.0 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.0:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.2.0.1 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.0.1:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.2.0.2 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.0.2:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.2.0.3 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.0.3:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.2.1 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.1:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.2.1.0 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.0:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.2.1.1 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.1:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.2.1.2 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.2:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.2.1.3 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.3:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.2.1.4 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.4:*:*:*:*:*:*:* |