CVE-2021-20532

7.8 HIGH

📋 TL;DR

This vulnerability in IBM Spectrum Protect Client allows a local user to escalate privileges to SYSTEM/root level due to insecure directory permissions. It affects IBM Spectrum Protect Client versions 8.1.0.0 through 8.1.11.0. The attacker must have local access to the system to exploit this.

💻 Affected Systems

Products:
  • IBM Spectrum Protect Client
Versions: 8.1.0.0 through 8.1.11.0
Operating Systems: Windows, Linux, AIX, Other supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations within the affected version range are vulnerable. The vulnerability exists in the installation directory permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full SYSTEM/root privileges, enabling complete system compromise, data theft, persistence installation, and lateral movement.

🟠

Likely Case

Local user with limited privileges escalates to administrative rights, potentially installing malware, accessing sensitive data, or modifying system configurations.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to the compromised user account only.

🌐 Internet-Facing: LOW - Requires local access to exploit, not remotely exploitable.
🏢 Internal Only: HIGH - Any local user (including low-privileged accounts) can potentially exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once local access is obtained. The vulnerability involves directory permission manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.1.12.0 and later

Vendor Advisory: https://www.ibm.com/support/pages/node/6445503

Restart Required: Yes

Instructions:

1. Download IBM Spectrum Protect Client version 8.1.12.0 or later from IBM Fix Central. 2. Stop all Spectrum Protect services. 3. Install the updated version. 4. Restart the system. 5. Verify the installation completed successfully.

🔧 Temporary Workarounds

Restrict directory permissions

all

Manually adjust permissions on the IBM Spectrum Protect installation directory to prevent unauthorized write access.

Windows: icacls "C:\Program Files\Tivoli\TSM\" /deny Users:(OI)(CI)W
Linux: chmod 755 /opt/tivoli/tsm/

Remove unnecessary local users

all

Reduce attack surface by removing non-essential local user accounts.

Windows: net user username /delete
Linux: userdel username

🧯 If You Can't Patch

  • Implement strict least privilege access controls for all local user accounts
  • Monitor the IBM Spectrum Protect installation directory for unauthorized permission changes

🔍 How to Verify

Check if Vulnerable:

Check the installed version of IBM Spectrum Protect Client. If version is between 8.1.0.0 and 8.1.11.0 inclusive, the system is vulnerable.

Check Version:

Windows: "C:\Program Files\Tivoli\TSM\dsmc.exe" -ver | Linux: dsmc -ver

Verify Fix Applied:

Verify the installed version is 8.1.12.0 or later and check that directory permissions are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected permission changes to IBM Spectrum Protect directories
  • Unauthorized access attempts to TSM installation paths
  • Privilege escalation events in system logs

Network Indicators:

  • N/A - Local privilege escalation only

SIEM Query:

EventID=4672 OR EventID=4688 on Windows systems with TSM process execution from non-admin users

🔗 References

📤 Share & Export