A vulnerability in the IBM Endpoint Manager for mobile devices could allow attackers to execute malicious code on the servers used by companies to manage devices.
The IBM Endpoint Manager Mobile Device Management (MDM) product provides companies with management, security and reporting functionality for mobile devices.
+ ALSO ON NETWORKWORLD: Big IT vendors mostly mum on commercial drone plans +
Researchers from a German security firm called RedTeam Pentesting discovered that authentication cookies for several IBM Endpoint Manager components are protected with a hardcoded static secret token that can be easily obtained. The affected components are iOS extender, Self-service portal, Trusted Services provider and Admin Portal.
“Once the secret is known, arbitrary cookie values can be crafted and sent to the respective application for further processing,” the RedTeam researchers said in a security advisory. This can then be used to execute arbitrary code on the IBM Endpoint Manager server, they said.
“The vulnerability allows unauthenticated remote attackers to execute arbitrary code with administrative privileges on the affected systems,” the researchers said. “It is highly likely that a successful attack on the application server can also be leveraged into a full compromise of all devices managed through the product.”
IBM released version 9.0.60100 of the product in order to address the vulnerability and also published a security bulletin. There are no workarounds or mitigations, so users should upgrade to the new version as soon as possible.