First published: Mon May 25 2015(Updated: )
The Endpoint Manager for Remote Control component in IBM Tivoli Endpoint Manager for Lifecycle Management 9.0.1 before IF6 and 9.1.0 before IF6 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Endpoint Manager | =9.0.1 | |
IBM Endpoint Manager | =9.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1915 is considered a moderate severity vulnerability due to the potential for session cookie interception.
To fix CVE-2015-1915, ensure that the secure flag is set for the session cookies in your IBM Tivoli Endpoint Manager configurations.
CVE-2015-1915 affects IBM Tivoli Endpoint Manager versions 9.0.1 before IF6 and 9.1.0 before IF6.
CVE-2015-1915 allows remote attackers to capture session cookies which can lead to session hijacking.
A known workaround for CVE-2015-1915 is to migrate to a newer version of IBM Tivoli Endpoint Manager that has patched this vulnerability.