CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS
Percentile
45.2%
A security vulnerability has been identified in all levels of IBM Spectrum Scale where an unauthorized user can send arbitrary data to the CLI commands and daemon. A fix for this vulnerability is available.
CVEID:CVE-2020-4926
**DESCRIPTION:**A vulnerability in the Spectrum Scale core component could allow unauthorized access to user data or injection of arbitrary data in the communication protocol.
CVSS Base score: 5.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/191600 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM Spectrum Scale | ALL |
For IBM Spectrum Scale levels lower than V5.1.3, apply V5.1.3 or later available from FixCentral at:
In addition to applying the recommended code level, ensure that the tscCmdAllowRemoteConnections configuration parameter is set to ‘no’, which requires a cluster minimum release level of 5.1.3 or later. Setting**tscCmdAllowRemoteConnections **to ‘no’ in a multi-cluster setting must be done after ensuring that the remote clusters are running Spectrum Scale v5.1.3 or later
See <<mmchconfig command>> for more details - <https://www.ibm.com/docs/en/spectrum-scale/5.1.3?topic=reference-mmchconfig-command>
Note : Systems running supported version should be upgraded to the current release containing the security fixes.
None
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | spectrum_scale | 5.1 | cpe:2.3:a:ibm:spectrum_scale:5.1:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS
Percentile
45.2%