When tracing is enabled, some passwords may be displayed in the IBM Spectrum Protect (formerly Tivoli Storage Manager) Server trace file.
UPDATED 1/16/2019: Changed “First Fixing VRM Level” in Remediation/Fixes table for 8.1 from 8.1.6 to 8.1.6.100
CVEID: CVE-2018-1788 DESCRIPTION: IBM Spectrum Protect Server could disclose highly sensitive information via trace logs to a local user.
CVSS Base Score: 4.1
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/148873> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N)
This vulnerability affects the following IBM Spectrum Protect (formerly Tivoli Storage Manager) Server levels:
IBM Spectrum Protect
Server Release | First Fixing
VRM Level | Platform | Link to Fix
—|—|—|—
8.1 | 8.1.6.100 | AIX
Linux
Windows | <ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/server>
7.1 | 7.1.9.100 | AIX
HP-UX
Linux
Solaris
Windows | <ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/server>
.
Tracing is disabled by default. It is normally enabled only when directed by IBM support to troubleshoot an issue. To minimize exposure to this vulnerability, disable tracing unless required and securely delete trace files that are no longer needed.