Jul 23, 2020 8:00 pm EDT
Categorized: High Severity
Share this post:
When the IBM Verify Gateway (IVG) components make API calls, there is insufficient protection of tenant secrets. It’s possible for an attacker to obtain the access token belonging to another tenant and issue an API while impersonating that tenant. As of v1.0.1 of IVG for RADIUS and IVG for AIX PAM, and v1.0.2 of IVG for Linux PAM and IVG for Windows Login, the client API secrets, access tokens, and cookies are scrubbed so that they cannot be captured for replay in another API call.
Affected product(s) and affected version(s):
Affected Product(s) | Version(s) |
IBM Verify Gateway (IVG) | RADIUS 1.0.0 |
IBM Verify Gateway (IVG) | PAM 1.0.0, 1.0.1 |
IBM Verify Gateway (IVG) | WinLogin 1.0.0, 1.0.1 |
Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: https://www.ibm.com/support/pages/node/6252475
from IBM Product Security Incident Response Team https://ift.tt/2CHnGXn
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.