First published: Sat Dec 06 2014(Updated: )
IBM Tivoli Endpoint Manager Mobile Device Management (MDM) before 9.0.60100 uses the same secret HMAC token across different customers' installations, which allows remote attackers to execute arbitrary code via crafted marshalled Ruby objects in cookies to (1) Enrollment and Apple iOS Management Extender, (2) Self-service portal, (3) Trusted Services provider, or (4) Admin Portal.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Endpoint Manager | <=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6140 has been assigned a moderate severity level due to the potential for remote code execution.
To fix CVE-2014-6140, ensure that you update IBM Tivoli Endpoint Manager Mobile Device Management to version 9.0.60100 or later.
CVE-2014-6140 affects installations of IBM Tivoli Endpoint Manager Mobile Device Management prior to version 9.0.60100.
Exploitation of CVE-2014-6140 can allow remote attackers to execute arbitrary code, potentially compromising the system.
Systems running IBM Tivoli Endpoint Manager Mobile Device Management versions before 9.0.60100 should be closely monitored for unauthorized access.