Multiple vulnerabilities in IBM Cognos Analytics



Published: 2018-01-25
Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2017-1783
CVE-2017-1784
CVE-2017-1779
CWE-ID CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
IBM Cognos Analytics
Client/Desktop applications / Office applications

Vendor IBM Corporation

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Security restrictions bypass

EUVDB-ID: #VU10243

Risk: Low

CVSSv3.1: 3.5 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-1783

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local unauthenticated attacker to bypass security restrictions on the target system.

The weakness exists due to insufficient access and privileges controls. A local attacker can change parameters set from the Cognos Analytics menus without proper authentication.

Mitigation

The vulnerability is fixed in the following versions: 11.0.8.0 GA, 11.0.7.0 and 11.0.6.0 Interim Fixes.

Vulnerable software versions

IBM Cognos Analytics: 11.0.0 - 11.0.7

External links

http://www-01.ibm.com/support/docview.wss?uid=swg22011561&myns=swgimgmt&mynp=OCSSTSF...


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Information disclosure

EUVDB-ID: #VU10249

Risk: Low

CVSSv3.1: 5.4 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-1784

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local unauthenticated attacker to obtain potentially sensitive information on the target system.

The weakness exists due to insufficient access and privileges controls. A local attacker can gain access to the results in temporary files that contain highly sensitive information.

Mitigation

The vulnerability is fixed in the following versions: 11.0.8.0 GA, 11.0.7.0 and 11.0.6.0 Interim Fixes.

Vulnerable software versions

IBM Cognos Analytics: 11.0.0 - 11.0.7

External links

http://www-01.ibm.com/support/docview.wss?uid=swg22011561&myns=swgimgmt&mynp=OCSSTSF...


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Information disclosure

EUVDB-ID: #VU10250

Risk: Low

CVSSv3.1: 5.4 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-1779

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local unauthenticated attacker to obtain potentially sensitive information on the target system.

The weakness exists due to insufficient access and privileges controls. A local attacker can gain access to locally cached credentials.

Mitigation

The vulnerability is fixed in the following versions: 11.0.8.0 GA, 11.0.7.0 and 11.0.6.0 Interim Fixes.

Vulnerable software versions

IBM Cognos Analytics: 11.0.0 - 11.0.7

External links

http://www-01.ibm.com/support/docview.wss?uid=swg22011561&myns=swgimgmt&mynp=OCSSTSF...


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###