First published: Sun Jul 17 2016(Updated: )
IBM Personal Communications (aka PCOMM) 6.x before 6.0.17 and 12.x before 12.0.0.1 does not properly restrict credential extraction, which allows local users to discover passwords by leveraging access to the victim account and executing a PowerShell script.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Personal Communications | =12.0.0 | |
IBM Personal Communications | =6.0.0 | |
IBM Personal Communications | =6.0.1 | |
IBM Personal Communications | =6.0.2 | |
IBM Personal Communications | =6.0.3 | |
IBM Personal Communications | =6.0.4 | |
IBM Personal Communications | =6.0.5 | |
IBM Personal Communications | =6.0.6 | |
IBM Personal Communications | =6.0.7 | |
IBM Personal Communications | =6.0.8 | |
IBM Personal Communications | =6.0.9 | |
IBM Personal Communications | =6.0.10 | |
IBM Personal Communications | =6.0.11 | |
IBM Personal Communications | =6.0.12 | |
IBM Personal Communications | =6.0.13 | |
IBM Personal Communications | =6.0.14 | |
IBM Personal Communications | =6.0.15 | |
IBM Personal Communications | =6.0.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0321 is rated as a moderate severity vulnerability due to its potential for credential extraction by local users.
To fix CVE-2016-0321, it is recommended to upgrade IBM Personal Communications to version 6.0.17 or later, or 12.0.0.1 or later.
CVE-2016-0321 affects IBM Personal Communications versions 6.x before 6.0.17 and 12.x before 12.0.0.1.
Local users with access to the victim account can exploit CVE-2016-0321 by executing a PowerShell script to extract passwords.
The impact of CVE-2016-0321 is that it allows an attacker to discover sensitive passwords from the compromised IBM Personal Communications application.