IBM Fusion and IBM Fusion HCI 2.3.0 through 2.8.2 is vulnerable to insecure network connection by allowing an attacker who gains access to a Fusion container to establish an external network connection.
The product establishes a communication channel to (or from) an endpoint for privileged or protected operations, but it does not properly ensure that it is communicating with the correct endpoint.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Storage_fusion | Ibm | 2.3.0 (including) | 2.9.0 (excluding) |
Storage_fusion_hci | Ibm | 2.3.0 (including) | 2.9.0 (excluding) |
Storage_fusion_hci_for_watsonx | Ibm | 2.8.2 (including) | 2.8.2 (including) |
Attackers might be able to spoof the intended endpoint from a different system or process, thus gaining the same level of access as the intended endpoint. While this issue frequently involves authentication between network-based clients and servers, other types of communication channels and endpoints can have this weakness.