CVE-2014-6141
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
02/02/2015
Last modified:
12/04/2025
Description
IBM Tivoli Monitoring (ITM) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, 6.2.3 through FP05, and 6.3.0 before FP04 allows remote authenticated users to bypass intended access restrictions and execute arbitrary commands by leveraging Take Action view authority to modify in-progress commands.
Impact
Base Score 2.0
8.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



