SB2022072119 - Remote code execution in IBM Tivoli Network Manager
Published: July 21, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Deserialization of Untrusted Data (CVE-ID: CVE-2019-17571)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data within the SocketServer class in Log4j. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system, if these is a deserialization gadget listening to untrusted network traffic for log data.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
References
- https://www.ibm.com/blogs/psirt/security-bulletin-ibm-tivoli-network-manager-is-vulnerable-to-arbitrary-code-execution-due-to-apache-log4j-cve-2019-1757/"
- https://www.ibm.com/blogs/psirt/security-bulletin-ibm-tivoli-network-manager-is-vulnerable-to-arbitrary-code-execution-due-to-apache-log4j-cve-2019-1757/</a><br><a
- https://www.ibm.com/support/pages/node/6605843"
- https://www.ibm.com/support/pages/node/6605843</a><br><br><br></p>