Vulnerability Description
IBM Spectrum Protect Plus 10.1.0 and 10.1.5 could allow a remote attacker to execute arbitrary code on the system. By using a specially crafted HTTP command, an attacker could exploit this vulnerability to execute arbitrary command on the system. IBM X-Force ID: 175023.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ibm | Spectrum Protect | >= 10.1.0, < 10.1.5 |
| Linux | Linux Kernel | - |
Related Weaknesses (CWE)
References
- https://exchange.xforce.ibmcloud.com/vulnerabilities/175023VDB EntryVendor Advisory
- https://www.ibm.com/support/pages/node/3178863PatchVendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-20-272/Third Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/175023VDB EntryVendor Advisory
- https://www.ibm.com/support/pages/node/3178863PatchVendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-20-272/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2020-4212?
CVE-2020-4212 is a vulnerability with a CVSS score of 9.8 (CRITICAL). IBM Spectrum Protect Plus 10.1.0 and 10.1.5 could allow a remote attacker to execute arbitrary code on the system. By using a specially crafted HTTP command, an attacker could exploit this vulnerabili...
How severe is CVE-2020-4212?
CVE-2020-4212 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-4212?
Check the references section above for vendor advisories and patch information. Affected products include: Ibm Spectrum Protect, Linux Linux Kernel.