Vulnerability Details CVE-2020-4771
IBM Spectrum Protect Operations Center 8.1.0.000 through 8.1.10.and 7.1.0.000 through 7.1.11 could allow a remote attacker to obtain sensitive information, caused by improper authentication of a websocket endpoint. By using known tools to subscribe to the websocket event stream, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 188993.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 35.2%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2020-4771
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:7.1.0.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:7.1.1.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:7.1.10.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:7.1.11
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:7.1.3.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:7.1.4.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:7.1.5.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:7.1.6.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:7.1.7.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:7.1.8.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:7.1.9.200
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:7.1.9.300
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:8.1.0.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:8.1.1.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:8.1.10
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:8.1.2.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:8.1.3.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:8.1.4.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:8.1.5.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:8.1.6.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:8.1.7.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:8.1.8.000
-
cpe:2.3:a:ibm:spectrum_protect_operations_center:8.1.9.000
-
-
cpe:2.3:o:linux:linux_kernel:-
-
cpe:2.3:o:microsoft:windows:-