Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.3975 IBM Maximo Health, Safety, and Environment Manager Installation Gives Application Access to Non-Authorized Users (CVE-2019-4546) 28 October 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Maximo Health- Safety and Environment Manage Publisher: IBM Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Increased Privileges -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-4546 Original Bulletin: https://www.ibm.com/support/pages/node/1087738 - --------------------------BEGIN INCLUDED TEXT-------------------- IBM Maximo Health, Safety, and Environment Manager Installation Gives Application Access to Non-Authorized Users (CVE-2019-4546) Document Information More support for: Maximo Health- Safety and Environment Manager Software version: 7.6.1 Operating system(s): Platform Independent Reference #: 1087738 Modified date: 23 October 2019 Security Bulletin Summary After installing the Health, Safety, and Environmental add-on to IBM Maximo Asset Management, a user is granted additional privileges that they are not normally allowed to access. Vulnerability Details CVEID: CVE-2019-4546 DESCRIPTION: After installing the Health, Safety, and Environmental add-on to IBM Maximo Asset Management, a user is granted additional privileges that they are not normally allowed to access. CVSS Base Score: 5.4 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 165948 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) Affected Products and Versions IBM Maximo Health, Safety, and Environment Manager 7.6.1 IBM Maximo for Oil and Gas 7.6.1 * To determine the core product version, log in and view System Information. The core product version is the "Tivoli's process automation engine" version. Please consult the Product Coexistence Matrix for a list of supported product combinations. Remediation/Fixes The recommended solution is to download the appropriate Interim Fix or Fix Pack from Fix Central ( What is Fix Central ) and apply for each affected product as soon as possible. Please see below for information on the fixes available for each product, version, and release. Follow the installation instructions in the 'readme' documentation provided with each fix pack or interim fix. For Maximo Asset Management 7.6: +-------+-------------------------------------------+---------------------------+ |VRM |Fix Pack, Feature Pack, or Interim Fix |Download | +-------+-------------------------------------------+---------------------------+ |7.6.1 |Maximo Health, Safety and Environment |FixCentral | | |Manager 7.6.1.0 Interim Fix | | | |7.6.1.0-TIV-MAMHSE-IF028 or latest Interim | | | |Fix available | | +-------+-------------------------------------------+---------------------------+ | |Maximo for Oil and Gas 7.6.1.0 Interim Fix | | |7.6.1 |7.6.1.0-TIV-MAMOG-IF028 or latest Interim |FixCentral | | |Fix available | | +-------+-------------------------------------------+---------------------------+ Get Notified about Future Security Bulletins References - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXbZ7dGaOgq3Tt24GAQh+yA//UCsflc7Z0iDEuZxTdLB4Xi8BcOGr5DiQ w7KiuHXoZgR5T6+1NvdNB9U06x17A9u1PNaKjGZlDAaU/fe/KsNjlH20C6er05Xz vMa/16KB9HAH69NZn/EJgZB0KmAUvAhFw61XiH0YOPOKi7r1VzMn1+fQhF+2wKWH N+kfTIcB/bmqXFereEuWzK3b848DrlJvnVGtARHQ3ZnyExHsKoWwfxK2WSfBBrHo Wt62ELjT0RykksD7JueCe+zsk/dgfaKtQlUe8dj/XUzy0ynUNnwvBXJAPfbD3Kme XfslKqsm5luowbg4aH9ApaldKDZX82yOhj1hteeDjaJrxS9AEls1sq0wbqSE/uIX nmpUDHyjgu4P3vwKEIBgYn2hXJlTiNfk1o3NWPmLBdluXfuEYg1lU0EPaZscJdsX /Yl+Ue0SG/bjHLiRJiSLE9hXzCqK96Vp7S3MXOeDho6Q9RshbG5lwBt1zTf0rMZ1 z5YLbcRa+nVIlx8kI5JoxpPIYpZXia3T/HFsuOrdlxl/l9WtCAEGfV4NAzUvjmmK eJYlrZfhhm8PH0LbVguSYLjOh8JsEY9Cv8yo3QZKyQPdudPdbOm4b2svILeWnjfb zHhmpayh4WxZuQiXCQj3SSKqQZ5+pRWNH9oAQjjOBZd8G33RnMLxOh6nb8jg9NV1 rn8O9fv0+3U= =hYMx -----END PGP SIGNATURE-----