First published: Wed Nov 30 2016(Updated: )
IBM QRadar SIEM 7.1 before MR2 Patch 13 and 7.2 before 7.2.7 executes unspecified processes at an incorrect privilege level, which makes it easier for remote authenticated users to obtain root access by leveraging a command-injection issue.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Security Information and Event Manager | <=7.1.0 | |
IBM QRadar Security Information and Event Manager | =7.2.0 | |
IBM QRadar Security Information and Event Manager | =7.2.1 | |
IBM QRadar Security Information and Event Manager | =7.2.2 | |
IBM QRadar Security Information and Event Manager | =7.2.3 | |
IBM QRadar Security Information and Event Manager | =7.2.4 | |
IBM QRadar Security Information and Event Manager | =7.2.5 | |
IBM QRadar Security Information and Event Manager | =7.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2876 has a high severity rating due to the potential for remote authenticated users to gain root access.
To fix CVE-2016-2876, users should upgrade to IBM QRadar SIEM version 7.1 MR2 Patch 13 or version 7.2.7 or newer.
Affected versions of IBM QRadar SIEM include 7.1 before MR2 Patch 13 and 7.2 versions prior to 7.2.7.
The vulnerability in CVE-2016-2876 is caused by unspecified processes executing at an incorrect privilege level due to a command-injection issue.
Remote authenticated users with access to vulnerable versions of IBM QRadar SIEM are at risk of obtaining root access.