CVE-2021-38979

7.5 HIGH

📋 TL;DR

IBM Tivoli Key Lifecycle Manager versions 3.0 through 4.1 store passwords using unsalted cryptographic hashes, making them vulnerable to rainbow table and brute-force attacks. This affects organizations using these versions for cryptographic key management. Attackers could potentially recover passwords from stored hash values.

💻 Affected Systems

Products:
  • IBM Tivoli Key Lifecycle Manager
Versions: 3.0, 3.0.1, 4.0, 4.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers recover administrative passwords, gain full control of the key management system, and compromise all managed cryptographic keys, leading to data decryption and system compromise.

🟠

Likely Case

Attackers with access to password hashes recover weaker passwords, gaining unauthorized access to the key management interface and potentially extracting some cryptographic keys.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the specific Tivoli Key Lifecycle Manager instance, though password recovery remains possible.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to password hash storage, which typically requires some level of system access. Password cracking tools can be used against obtained hashes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade to version 4.1.0.2 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/6516034

Restart Required: Yes

Instructions:

1. Download the interim fix from IBM Fix Central. 2. Stop all Tivoli Key Lifecycle Manager services. 3. Apply the fix according to IBM instructions. 4. Restart all services. 5. Force password resets for all accounts.

🔧 Temporary Workarounds

Enforce strong password policies

all

Require complex, long passwords to make hash cracking more difficult

Restrict access to hash storage

all

Implement strict file permissions and access controls on password hash files

🧯 If You Can't Patch

  • Implement network segmentation to isolate Tivoli Key Lifecycle Manager from untrusted networks
  • Enable multi-factor authentication if supported and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check installed version via administrative console or version command. Versions 3.0, 3.0.1, 4.0, and 4.1 are vulnerable.

Check Version:

Check product documentation for version command specific to your installation method

Verify Fix Applied:

Verify version is 4.1.0.2 or later, or confirm interim fix is applied via patch management system.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts
  • Unusual access patterns to password files
  • Administrative password changes

Network Indicators:

  • Unusual connections to Tivoli Key Lifecycle Manager ports
  • Traffic patterns suggesting hash extraction

SIEM Query:

source="tivoli_klm" AND (event_type="authentication_failure" OR file_access="*password*")

🔗 References

📤 Share & Export