Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-1368 : Security Advisory and Response

Learn about CVE-2017-1368 affecting IBM Security Identity Governance Virtual Appliance versions 5.2 to 5.2.3.2. Understand the impact, technical details, and mitigation steps.

IBM Security Identity Governance Virtual Appliance versions 5.2 through 5.2.3.2 are affected by a vulnerability where the secure attribute is not set on authorization tokens or session cookies, potentially allowing attackers to intercept cookie values.

Understanding CVE-2017-1368

This CVE involves a security issue in IBM Security Identity Governance Virtual Appliance versions 5.2 through 5.2.3.2.

What is CVE-2017-1368?

The vulnerability in versions 5.2 through 5.2.3.2 of IBM Security Identity Governance Virtual Appliance arises from the absence of the secure attribute on authorization tokens or session cookies. This oversight could enable attackers to capture cookie values.

The Impact of CVE-2017-1368

The vulnerability could permit attackers to obtain cookie values by tricking users into accessing a malicious http:// link or embedding the link on a visited website. This could lead to unauthorized access to sensitive information.

Technical Details of CVE-2017-1368

This section delves into the technical aspects of the CVE.

Vulnerability Description

The issue stems from the failure to set the secure attribute on authorization tokens or session cookies in affected versions of IBM Security Identity Governance Virtual Appliance.

Affected Systems and Versions

        Product: Security Identity Governance and Intelligence
        Vendor: IBM
        Affected Versions: 5.2, 5.2.1, 5.2.2, 5.2.2.1, 5.2.3, 5.2.3.1, 5.2.3.2

Exploitation Mechanism

        Attack Complexity: Low
        Attack Vector: Network
        Privileges Required: None
        User Interaction: Required
        Exploit Code Maturity: Unproven
        CVSS Base Score: 4.3 (Medium)

Mitigation and Prevention

Protecting systems from this vulnerability requires specific actions.

Immediate Steps to Take

        Apply official fixes provided by IBM for the affected versions.
        Educate users about the risks of clicking on unknown links.

Long-Term Security Practices

        Implement secure coding practices to prevent similar vulnerabilities.
        Regularly update and patch software to address security flaws.

Patching and Updates

        Ensure all systems are updated with the latest patches and security updates.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now