First published: Wed Apr 04 2018(Updated: )
The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.1.6) CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Products should encourage customers to take this step as a high priority action. IBM X-Force ID: 139972.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Spectrum Protect For Space Management | >=7.1.0.0<=7.1.8.1 | |
Ibm Spectrum Protect For Space Management | >=8.1.0.0<=8.1.4.0 | |
Ibm Spectrum Protect For Virtual Environments | >=7.1.0.0<=7.1.8.0 | |
Ibm Spectrum Protect For Virtual Environments | >=8.1.0.0<=8.1.4.0 | |
Ibm Spectrum Protect Snapshot | >=4.1.0.0<=4.1.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-1447.
The severity of CVE-2018-1447 is high with a severity value of 8.1.
The affected software products are IBM Spectrum Protect 7.1 and 7.2, IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.1.6, IBM Spectrum Protect For Space Management (versions between 7.1.0.0 and 7.1.8.1), IBM Spectrum Protect For Space Management (versions between 8.1.0.0 and 8.1.4.0), IBM Spectrum Protect For Virtual Environments (versions between 7.1.0.0 and 7.1.8.0), IBM Spectrum Protect For Virtual Environments (versions between 8.1.0.0 and 8.1.4.0), and IBM Spectrum Protect Snapshot (versions between 4.1.0.0 and 4.1.6.3).
The impact of CVE-2018-1447 is that the GSKit logic fails to salt the hash function, resulting in weaker than expected protection of passwords. A weak password may be recovered.
To mitigate CVE-2018-1447, update the affected software products to the recommended versions and then change the passwords.