Lucene search

K
ibmIBM814520C3517008FA9216486E6E120E3B923562867F5C6179E3DB3F5A832DC710
HistoryMay 05, 2022 - 7:18 p.m.

Security Bulletin: TS3000 (TSSC/IMC) is vulnerable to privilege escalation vulnerability due to polkit ( CVE-2021-4034 )

2022-05-0519:18:30
www.ibm.com
37
tssc/imc
polkit
privilege escalation
cve-2021-4034
ibm
patch
vulnerability
download

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

46.9%

Summary

A privilege escalation vulnerability has been discovered in pkexec, a component of polkit. The TSSC does not use pkexec, but the executable does exist on the system. A patch has been provided that removes the executable from the file system.

Vulnerability Details

CVEID:CVE-2021-4034
**DESCRIPTION:**Polkit could allow a local authenticated attacker to gain elevated privileges on the system, caused by incorrect handling of the argument vectors in the pkexec utility. By crafting environment variables in a specific way, an attacker could exploit this vulnerability to execute commands with root privileges.
CVSS Base score: 7.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/218087 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product|**Version
**
—|—
TSSC/IMC| 9.2.16
TSSC/IMC| 9.2.14
TSSC/IMC| 9.2.11
TSSC/IMC| 9.1.11
TSSC/IMC| 9.1.9
TSSC/IMC| 9.1.7
TSSC/IMC| 9.0.6
TSSC/IMC| 9.0.4
TSSC/IMC| 8.6.6
TSSC/IMC| 8.5.5

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.

Product Version Remediation/Fix/Instructions
TSSC/IMC 9.2.16 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.2.14 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.2.11 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.1.11 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.1.9 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.1.7 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.0.6 Download patch and execute on TSSC/IMC system
TSSC/IMC 9.0.4 Download patch and execute on TSSC/IMC system
TSSC/IMC 8.6.6 Download patch and execute on TSSC/IMC system
TSSC/IMC 8.5.5 Download patch and execute on TSSC/IMC system

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmts7700Match8.5.5
OR
ibmts7700Match8.6.6
OR
ibmts7700Match9.0.4
OR
ibmts7700Match9.1.7
OR
ibmts7700Match9.1.9
OR
ibmts7700Match9.2.14
OR
ibmts7700Match9.2.16
VendorProductVersionCPE
ibmts77008.5.5cpe:2.3:h:ibm:ts7700:8.5.5:*:*:*:*:*:*:*
ibmts77008.6.6cpe:2.3:h:ibm:ts7700:8.6.6:*:*:*:*:*:*:*
ibmts77009.0.4cpe:2.3:h:ibm:ts7700:9.0.4:*:*:*:*:*:*:*
ibmts77009.1.7cpe:2.3:h:ibm:ts7700:9.1.7:*:*:*:*:*:*:*
ibmts77009.1.9cpe:2.3:h:ibm:ts7700:9.1.9:*:*:*:*:*:*:*
ibmts77009.2.14cpe:2.3:h:ibm:ts7700:9.2.14:*:*:*:*:*:*:*
ibmts77009.2.16cpe:2.3:h:ibm:ts7700:9.2.16:*:*:*:*:*:*:*

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

46.9%