First published: Thu Jan 04 2018(Updated: )
IBM Tivoli Key Lifecycle Manager 2.6 and 2.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 133639.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Key Lifecycle Manager | =2.6.0 | |
IBM Security Key Lifecycle Manager | =2.6.0.1 | |
IBM Security Key Lifecycle Manager | =2.6.0.2 | |
IBM Security Key Lifecycle Manager | =2.6.0.3 | |
IBM Security Key Lifecycle Manager | =2.7.0 | |
IBM Security Key Lifecycle Manager | =2.7.0.1 | |
IBM Security Key Lifecycle Manager | =2.7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1672 has a moderate severity score due to its potential for cross-site request forgery attacks.
To fix CVE-2017-1672, upgrade IBM Tivoli Key Lifecycle Manager to the latest patched version provided by IBM.
The affected versions include IBM Tivoli Key Lifecycle Manager 2.6.0, 2.6.0.1, 2.6.0.2, 2.6.0.3, 2.7.0, 2.7.0.1, and 2.7.0.2.
CVE-2017-1672 is associated with cross-site request forgery (CSRF) attacks that can lead to unauthorized actions.
Yes, user interaction is typically required for an attacker to exploit CVE-2017-1672 through trusted user actions.