The IBM Tivoli Storage Manager Client may display the obfuscated VMware vCenter userID and password during VM backup with the INCLUDE.VMTSMVSS option when application tracing is enabled with VMTSMVSS flag. This problem only manifests when the Tivoli Storage Manager Client is used as the IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware data mover.
CVEID: CVE-2016-6110**
DESCRIPTION:** IBM Tivoli Storage Manager disclosed unencrypted login credentials to Vmware vCenter that could be obtained by a local user.
CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/118265 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)
This security exposure affects:
Tivoli Storage Manager Client Release
| Fixing VRM Level|Platform|Link to Fix / Fix Availability Target
—|—|—|—
7.1| 7.1.6.4| Linux x86
Windows x64| http://www.ibm.com/support/docview.wss?uid=swg24042496
Tivoli Storage Manager for Virtual Environments: Data Protection for VMware Release | Fixing VRM Level | Platform | Link to Fix / Fix Availability Target |
---|---|---|---|
7.1 | 7.1.6.4 | Linux | |
Windows | <http://www.ibm.com/support/docview.wss?uid=swg24042520> |
|
|
|
—|—|—|—
|
|
|
Application tracing is disabled by default. It is normally enabled only when directed by IBM support to troubleshoot an issue.
To minimize exposure to this vulnerability, disable tracing unless required and delete trace files that are no longer needed.