CVE-2014-6141CVE-2014-6141

Affected configuration(s):

cpe:/a:ibm:tivoli_monitoring:6.2.0
cpe:/a:ibm:tivoli_monitoring:6.2.0.1
cpe:/a:ibm:tivoli_monitoring:6.2.0.2
cpe:/a:ibm:tivoli_monitoring:6.2.0.3
cpe:/a:ibm:tivoli_monitoring:6.2.1
cpe:/a:ibm:tivoli_monitoring:6.2.1.0
cpe:/a:ibm:tivoli_monitoring:6.2.1.1
cpe:/a:ibm:tivoli_monitoring:6.2.1.2
cpe:/a:ibm:tivoli_monitoring:6.2.1.3
cpe:/a:ibm:tivoli_monitoring:6.2.1.4
cpe:/a:ibm:tivoli_monitoring:6.2.2
cpe:/a:ibm:tivoli_monitoring:6.2.2.0
cpe:/a:ibm:tivoli_monitoring:6.2.2.1
cpe:/a:ibm:tivoli_monitoring:6.2.2.2
cpe:/a:ibm:tivoli_monitoring:6.2.2.3
cpe:/a:ibm:tivoli_monitoring:6.2.2.4
cpe:/a:ibm:tivoli_monitoring:6.2.2.5
cpe:/a:ibm:tivoli_monitoring:6.2.2.6
cpe:/a:ibm:tivoli_monitoring:6.2.2.7
cpe:/a:ibm:tivoli_monitoring:6.2.2.8
cpe:/a:ibm:tivoli_monitoring:6.2.2.9
cpe:/a:ibm:tivoli_monitoring:6.2.3
cpe:/a:ibm:tivoli_monitoring:6.2.3.0
cpe:/a:ibm:tivoli_monitoring:6.2.3.1
cpe:/a:ibm:tivoli_monitoring:6.2.3.2
cpe:/a:ibm:tivoli_monitoring:6.2.3.3
cpe:/a:ibm:tivoli_monitoring:6.2.3.4
cpe:/a:ibm:tivoli_monitoring:6.2.3.5
cpe:/a:ibm:tivoli_monitoring:6.3.0
cpe:/a:ibm:tivoli_monitoring:6.3.0.1
cpe:/a:ibm:tivoli_monitoring:6.3.0.2
cpe:/a:ibm:tivoli_monitoring:6.3.0.3
cpe:/a:ibm:tivoli_monitoring:6.3.0.4

Date published: 2015-02-01T20:59:01.373-05:00

Date last modified: 2017-09-07T21:29:09.917-04:00

CVSS Score: 8.5

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://www-01.ibm.com/support/docview.wss?uid=swg21690932

Summary: IBM Tivoli Monitoring (ITM) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, 6.2.3 through FP05, and 6.3.0 before FP04 allows remote authenticated users to bypass intended access restrictions and execute arbitrary commands by leveraging Take Action view authority to modify in-progress commands.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.