First published: Tue Jan 21 2014(Updated: )
The Risk Based Access functionality in IBM Tivoli Federated Identity Manager (TFIM) 6.2.2 before FP9 and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.2.2 before FP9 does not prevent reuse of One Time Password (OTP) tokens, which makes it easier for remote authenticated users to complete transactions by leveraging access to an already-used token.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Federated Identity Manager | =6.2.2 | |
IBM Tivoli Federated Identity Manager | =6.2.2.1 | |
IBM Tivoli Federated Identity Manager | =6.2.2.2 | |
IBM Tivoli Federated Identity Manager | =6.2.2.3 | |
IBM Tivoli Federated Identity Manager | =6.2.2.4 | |
IBM Tivoli Federated Identity Manager | =6.2.2.5 | |
IBM Tivoli Federated Identity Manager | =6.2.2.6 | |
IBM Tivoli Federated Identity Manager | =6.2.2.7 | |
IBM Tivoli Federated Identity Manager | =6.2.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-5429 is classified as medium, indicating moderate risk for exploitation.
To fix CVE-2013-5429, upgrade to IBM Tivoli Federated Identity Manager version 6.2.2 FP9 or later.
CVE-2013-5429 affects IBM Tivoli Federated Identity Manager versions 6.2.2 to 6.2.2.8 before FP9.
CVE-2013-5429 is a vulnerability related to the reuse of One Time Password tokens.
Yes, CVE-2013-5429 can be exploited remotely by authenticated users due to the flawed OTP token handling.