IBM Spectrum Protect Plus contains hard-coded credentials which could allow a remote attacker to gain elevated privileges. UPDATED: 24 February 2021 - Remediation/Fixes section updated with additional vSnap requirements for upgrading to 10.1.7. UPDATED: 23 April 2021 - Added 10.1.8 fix which eliminates the need to perform the additional steps that were required when upgrading to 10.1.7.
CVEID:CVE-2020-4854
**DESCRIPTION:**IBM Spectrum Protect Plus contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/190454 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM Spectrum Protect Plus | 10.1.0-10.1.6 |
Spectrum Protect Plus Release|Fixing VRM Level|Platform|**APAR
|Link to Fix
—|—|—|—|—
10.1| 10.1.7 (see Note) **| Linux| None
| <https://www.ibm.com/support/pages/node/6330495>
10.1
| 10.1.8
| Linux
| IT35746
| <https://www.ibm.com/support/pages/node/6415111>
**
NOTE:**
If you are upgrading to 10.1.7 the following additional steps are required. These steps are NOT required if upgrading to 10.1.8.
For external vSnap servers, upgrade to version 10.1.7.
If you are using the internal vSnap on the IBM Spectrum Protect Plus server, upgrade it to version 10.1.7 and then migrate it to an external vSnap. Refer to detailed
instructions here: https://www.ibm.com/support/knowledgecenter/en/SSNQFQ_10.1./spp/t_spp_migrating_vsnap_data_to_standalone_vsnap.html
If you are not using the internal vSnap, follow these steps.
None