IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 could allow a remote attacker to bypass security restrictions when configured with SAML authentication. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to bypass the authentication process and gain full administrative access to the system. IBM X-Force ID: 180532.
Published 2020-05-07 20:15:13
Updated 2022-07-12 17:42:04
View at NVD,   CVE.org

Products affected by CVE-2020-4427

CVE-2020-4427 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
IBM Data Risk Manager Security Bypass Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
IBM Data Risk Manager contains a security bypass vulnerability that could allow a remote attacker to bypass security restrictions when configured with SAML authentication. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to bypass the authentication process a
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2020-4427
Added on 2021-11-03 Action due date 2022-05-03

Exploit prediction scoring system (EPSS) score for CVE-2020-4427

2.47%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2020-4427

  • IBM Data Risk Manager Arbitrary File Download
    Disclosure Date: 2020-04-21
    First seen: 2020-05-14
    auxiliary/admin/http/ibm_drm_download
    IBM Data Risk Manager (IDRM) contains two vulnerabilities that can be chained by an unauthenticated attacker to download arbitrary files off the system. The first is an unauthenticated bypass, followed by a path traversal. This module exploits both vulnerabil
  • IBM Data Risk Manager Unauthenticated Remote Code Execution
    Disclosure Date: 2020-04-21
    First seen: 2020-05-14
    exploit/linux/http/ibm_drm_rce
    IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root. The first is an unauthenticated bypass, followed by a command injection as the server user, and finally ab

CVSS scores for CVE-2020-4427

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
9.0
HIGH AV:N/AC:L/Au:S/C:C/I:C/A:C
8.0
10.0
NIST
9.0
CRITICAL CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
2.2
6.0
IBM Corporation
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST

References for CVE-2020-4427

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!