Lucene search

K
ibmIBME6CAB17065B9150755457F79E9772DE109B3DE6EC068ACF1C3F65E04CC41F0E2
HistoryMay 23, 2022 - 12:34 p.m.

Security Bulletin: A vulnerability has been identified in IBM Spectrum Scale where an unauthorized user can send arbitrary data to the CLI commands and daemon (CVE-2020-4926)

2022-05-2312:34:01
www.ibm.com
22
ibm spectrum scale
vulnerability
unauthorized access
data injection
fix
v5.1.3
ibm fixcentral

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

45.2%

Summary

A security vulnerability has been identified in all levels of IBM Spectrum Scale where an unauthorized user can send arbitrary data to the CLI commands and daemon. A fix for this vulnerability is available.

Vulnerability Details

CVEID:CVE-2020-4926
**DESCRIPTION:**A vulnerability in the Spectrum Scale core component could allow unauthorized access to user data or injection of arbitrary data in the communication protocol.
CVSS Base score: 5.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/191600 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Spectrum Scale ALL

Remediation/Fixes

For IBM Spectrum Scale levels lower than V5.1.3, apply V5.1.3 or later available from FixCentral at:

https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=Software%20defined%20storage&product=ibm/StorageSoftware/IBM+Spectrum+Scale&release=5.1.3&platform=All&function=all

In addition to applying the recommended code level, ensure that the tscCmdAllowRemoteConnections configuration parameter is set to ‘no’, which requires a cluster minimum release level of 5.1.3 or later. Setting**tscCmdAllowRemoteConnections **to ‘no’ in a multi-cluster setting must be done after ensuring that the remote clusters are running Spectrum Scale v5.1.3 or later

See <<mmchconfig command>> for more details - <https://www.ibm.com/docs/en/spectrum-scale/5.1.3?topic=reference-mmchconfig-command&gt;

Note : Systems running supported version should be upgraded to the current release containing the security fixes.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmspectrum_scaleMatch5.1
VendorProductVersionCPE
ibmspectrum_scale5.1cpe:2.3:a:ibm:spectrum_scale:5.1:*:*:*:*:*:*:*

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

45.2%

Related for E6CAB17065B9150755457F79E9772DE109B3DE6EC068ACF1C3F65E04CC41F0E2