First published: Wed Feb 08 2017(Updated: )
IBM dashDB Local uses hard-coded credentials that could allow a remote attacker to gain access to the Docker container or database.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM dashDB Local | =1.0.0 | |
IBM dashDB Local | =1.1.0 | |
IBM dashDB Local | =1.1.1 | |
IBM dashDB Local | =1.2.0 | |
IBM dashDB Local | =1.2.1 | |
IBM dashDB Local | =1.3.0 | |
IBM dashDB Local | =1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8954 has been classified with a medium severity due to the risk of unauthorized access to the Docker container or database.
To fix CVE-2016-8954, update to a version of IBM dashDB Local that does not utilize hard-coded credentials.
The affected versions include IBM dashDB Local 1.0.0, 1.1.0, 1.1.1, 1.2.0, 1.2.1, 1.3.0, and 1.3.1.
Yes, CVE-2016-8954 can be exploited remotely by an attacker to gain access to the system.
The potential impacts of CVE-2016-8954 include unauthorized access to sensitive data and control over the Docker container.