First published: Wed Feb 01 2017(Updated: )
IBM Tivoli Storage Manager Operations Center could allow an authenticated attacker to enable or disable the application's REST API, which may let the attacker violate security policy.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Storage Manager | =6.4.1 | |
IBM Tivoli Storage Manager | =6.4.1.1 | |
IBM Tivoli Storage Manager | =6.4.2 | |
IBM Tivoli Storage Manager | =6.4.2.1 | |
IBM Tivoli Storage Manager | =6.4.2.2 | |
IBM Tivoli Storage Manager | =6.4.2.3 | |
IBM Tivoli Storage Manager | =6.4.2.4 | |
IBM Tivoli Storage Manager | =7.1 | |
IBM Tivoli Storage Manager | =7.1.0.1 | |
IBM Tivoli Storage Manager | =7.1.0.2 | |
IBM Tivoli Storage Manager | =7.1.1.1 | |
IBM Tivoli Storage Manager | =7.1.1.2 | |
IBM Tivoli Storage Manager | =7.1.3 | |
IBM Tivoli Storage Manager | =7.1.3.1 | |
IBM Tivoli Storage Manager | =7.1.3.2 | |
IBM Tivoli Storage Manager | =7.1.4 | |
IBM Tivoli Storage Manager | =7.1.4.1 | |
IBM Tivoli Storage Manager | =7.1.4.2 | |
IBM Tivoli Storage Manager | =7.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6044 is classified as a high severity vulnerability due to its potential to violate security policies.
To resolve CVE-2016-6044, apply the latest patches provided by IBM for affected Tivoli Storage Manager versions.
CVE-2016-6044 affects several versions of IBM Tivoli Storage Manager, specifically versions 6.4.1, 6.4.2, and 7.1.x.
CVE-2016-6044 allows authenticated attackers to manipulate the application's REST API, potentially compromising system integrity.
Yes, exploitation of CVE-2016-6044 requires authenticated access to the IBM Tivoli Storage Manager.