First published: Tue Jan 05 2021(Updated: )
IBM Security Guardium 10.6 and 11.2 could allow a local attacker to execute arbitrary commands on the system as an unprivileged user, caused by command injection vulnerability. IBM X-Force ID: 186700.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium z/OS | =10.6 | |
IBM InfoSphere Guardium z/OS | =11.2 | |
Linux Kernel | ||
IBM InfoSphere Guardium z/OS | <=10.5 | |
IBM InfoSphere Guardium z/OS | <=10.6 | |
IBM InfoSphere Guardium z/OS | <=11.0 | |
IBM InfoSphere Guardium z/OS | <=11.1 | |
IBM InfoSphere Guardium z/OS | <=11.2 | |
IBM InfoSphere Guardium z/OS | <=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4688 is a command injection vulnerability in IBM Security Guardium 10.6 and 11.2 that could allow a local attacker to execute arbitrary commands on the system as an unprivileged user.
IBM Security Guardium versions 10.5, 10.6, 11.0, 11.1, 11.2, and 11.3 are affected by CVE-2020-4688.
CVE-2020-4688 has a severity rating of 7.8 (high).
A local attacker can exploit CVE-2020-4688 by injecting arbitrary commands on the system as an unprivileged user.
Yes, IBM has provided a fix for CVE-2020-4688. Please refer to the IBM support page for more information.