Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.1939 Security Bulletin: IBM Watson Knowledge Catalog (with Information Server) is affected by a Cryptographic vulnerability 30 May 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM InfoSphere Information Server Publisher: IBM Operating System: AIX Linux variants Windows Impact/Access: Access Privileged Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-4220 Original Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10881197 - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: IBM Watson Knowledge Catalog (with Information Server) is affected by a Cryptographic vulnerability Document information More support for: InfoSphere Information Server Component: InfoSphere Governance Catalog Software version: 11.7.1.0 Operating system(s): AIX, Linux, Windows Reference #: 0881197 Modified date: 29 May 2019 Summary A Cryptographic vulnerability was addressed by IBM Watson Knowledge Catalog (with Information Server). Vulnerability Details CVEID: CVE-2019-4220 DESCRIPTION: IBM InfoSphere Information Server stores a common hard coded encryption key that could be used to decrypt sensitive information. CVSS Base Score: 6.2 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 159229 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) Affected Products and Versions The following products, running on all supported platforms, are affected: IBM Watson Knowledge Catalog (with Information Server): version 11.7.1.0 IBM InfoSphere Information Server on Cloud: version 11.7.1.0 Remediation/Fixes Product VRMF APAR Remediation/First Fix InfoSphere Watson 11.7.1.0 PH10752 1. If you installed Information Server 11.7.1.0 Knowledge Catalog using the original suite release image (with Information --Do not apply any Watson Knowledge Catalog Server), Information patch before applying this fix. Server on Cloud --See Technote to run a script that will fix your Watson Knowledge Catalog installation. 2. If you installed Information Server 11.7.1.0 using the respin release image --or-- upgraded an Information Server 11.7.0.x installation to version 11.7.1.0 --No action is needed Workarounds and Mitigations See Technote for details. Change History 29 May 2019: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXO8N72aOgq3Tt24GAQiuMhAAqvgHYJ2LJNIodTVki/Wc7I8+cm1z4goe X0TSCt2hrs1z5USXzFWpux2dqlkFMdaBoTSsHUPUcmWx9qe+UHsNVBlQm4WJDseC IzLbegM0ZV0NF9PY5PEdp0rkrXCBgnJAt5E8z5lhrtgGsmDep3cYAnNa6faBXJ2O CufrojVu0LTLyj81eBa7WeU61smgR7QtJiXBJAqz4FKCN4ct69kr/bGCRyxiQiNT oqA3RoUBaPZjwZCdmoSlhj4a9v1ctuKyJDwyUiWtZ1I/In2nQDZpJeOgMS2kptTC 6PHiv7Osdn+MlLiOXtwSsxJrrIM/mhS0myPw8Gx33+HYL5tONMLVTwyTZeIDRKZh lkfZ4CxRZ2bkuNkO4o4pUQwH6VhzO7CLzy5HJXQx0s+ipEu68ODGhdP2lb0/3LwM 02hNFhWIUKGvlLsjUJmUeeEygUXEnlD5u0XCHRc5A3b52pDpcIbXurG7M2G3a2uJ Ps9JNQaG0IiPKVjklRFVphOAbw8fIbhC5V1M1ieie9ddXzh+dL2socBzJvXLbPRT DmYSeVShxU0WuM7u9BL7b0k9aTotjYEj8mOWCQ4QeUXP9+BA1NYZEpFsrKpIg+K9 HW/hNZh+J0RUwtAL5rVHwENZo7aWg9PDQFZbIelXSJxMS+y14esV0IKsEgA56tL9 Z1hgLOYTMLc= =5zdF -----END PGP SIGNATURE-----