// For flags

CVE-2018-1447

 

Severity Score

8.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.1.6) CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Products should encourage customers to take this step as a high priority action. IBM X-Force ID: 139972.

La lógica KDB de GSKit (IBM Spectrum Protect 7.1 y 7.2) y CMS (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4 y 4.1.6) no añade sal a la función del hash, por lo que resulta en una protección de contraseñas más débil de lo esperado. Podría recuperarse una contraseña débil. Nota: Tras actualizar, el cliente debería cambiar la contraseña para asegurarse de que la nueva contraseña se almacena de forma más segura. Los productos deberían animar a los clientes a considerar este paso como muy prioritario. IBM X-Force ID: 139972.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-12-13 CVE Reserved
  • 2018-04-04 CVE Published
  • 2023-10-05 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-916: Use of Password Hash With Insufficient Computational Effort
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ibm
Search vendor "Ibm"
Spectrum Protect For Space Management
Search vendor "Ibm" for product "Spectrum Protect For Space Management"
>= 7.1.0.0 <= 7.1.8.1
Search vendor "Ibm" for product "Spectrum Protect For Space Management" and version " >= 7.1.0.0 <= 7.1.8.1"
vmware
Affected
Ibm
Search vendor "Ibm"
Spectrum Protect For Space Management
Search vendor "Ibm" for product "Spectrum Protect For Space Management"
>= 8.1.0.0 <= 8.1.4.0
Search vendor "Ibm" for product "Spectrum Protect For Space Management" and version " >= 8.1.0.0 <= 8.1.4.0"
vmware
Affected
Ibm
Search vendor "Ibm"
Spectrum Protect For Virtual Environments
Search vendor "Ibm" for product "Spectrum Protect For Virtual Environments"
>= 7.1.0.0 <= 7.1.8.0
Search vendor "Ibm" for product "Spectrum Protect For Virtual Environments" and version " >= 7.1.0.0 <= 7.1.8.0"
vmware
Affected
Ibm
Search vendor "Ibm"
Spectrum Protect For Virtual Environments
Search vendor "Ibm" for product "Spectrum Protect For Virtual Environments"
>= 8.1.0.0 <= 8.1.4.0
Search vendor "Ibm" for product "Spectrum Protect For Virtual Environments" and version " >= 8.1.0.0 <= 8.1.4.0"
vmware
Affected
Ibm
Search vendor "Ibm"
Spectrum Protect Snapshot
Search vendor "Ibm" for product "Spectrum Protect Snapshot"
>= 4.1.0.0 <= 4.1.6.3
Search vendor "Ibm" for product "Spectrum Protect Snapshot" and version " >= 4.1.0.0 <= 4.1.6.3"
vmware
Affected