Thursday, July 23, 2020

Security Bulletin: IBM Verify Gateway does not sufficiently guard against unauthorized API calls (PSIRT-ADV0022379)

Jul 23, 2020 8:00 pm EDT

Categorized: High Severity

Share this post:

When the IBM Verify Gateway (IVG) components make API calls, there is insufficient protection of tenant secrets. It’s possible for an attacker to obtain the access token belonging to another tenant and issue an API while impersonating that tenant. As of v1.0.1 of IVG for RADIUS and IVG for AIX PAM, and v1.0.2 of IVG for Linux PAM and IVG for Windows Login, the client API secrets, access tokens, and cookies are scrubbed so that they cannot be captured for replay in another API call.

Affected product(s) and affected version(s):

Affected Product(s) Version(s)
IBM Verify Gateway (IVG) RADIUS 1.0.0
IBM Verify Gateway (IVG) PAM 1.0.0, 1.0.1
IBM Verify Gateway (IVG) WinLogin 1.0.0, 1.0.1

Refer to the following reference URLs for remediation and additional vulnerability details:  
Source Bulletin: https://www.ibm.com/support/pages/node/6252475



from IBM Product Security Incident Response Team https://ift.tt/2CHnGXn

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.