First published: Fri May 14 2021(Updated: )
IBM Planning Analytics connects to a Redis server. The Redis server, an in-memory data structure store, running on the remote host is not protected by password authentication. A remote attacker can exploit this to gain unauthorized access to the server.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Planning Analytics Cloud | =2.0.0 | |
IBM Planning Analytics Local | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-4670 is critical, with a CVSS score of 9.1.
The affected software for CVE-2020-4670 includes IBM Planning Analytics Cloud 2.0.0 and IBM Planning Analytics Local 2.0.0.
A remote attacker can exploit CVE-2020-4670 by gaining unauthorized access to the unprotected Redis server.
Yes, a fix is provided by IBM. Please refer to the official IBM support pages for details on how to apply the fix.
The Common Weakness Enumeration (CWE) ID for CVE-2020-4670 is 306.