PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-0371 IBM CVE debrief

IBM Tivoli Storage Manager (TSM) can reveal a password in plain text through application trace output when application tracing is enabled. This is a credential-disclosure issue rather than a code-execution flaw, but it can still expose sensitive access credentials to anyone who can read the trace output or related logs.

Vendor
IBM
Product
CVE-2016-0371
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-01
Original CVE updated
2026-05-13
Advisory published
2017-02-01
Advisory updated
2026-05-13

Who should care

IBM Tivoli Storage Manager administrators, backup/storage operators, and security teams responsible for log handling, trace collection, and credential hygiene should pay attention. Any environment that enables application tracing on affected TSM releases should treat trace files as sensitive until the issue is remediated.

Technical summary

NVD describes the issue as a password being displayed in plain text via application trace output while application tracing is enabled. The affected IBM Tivoli Storage Manager ranges listed by NVD are 7.1.0.0 through 7.1.6.2, 6.4.0.0 through 6.4.3.3, and 5.5 through 6.3.2.5. The CVSS vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates a locally accessible disclosure condition with high confidentiality impact and no integrity or availability impact.

Defensive priority

Medium. The issue requires local access and tracing to be enabled, but it can expose credentials in clear text, which may enable follow-on unauthorized access if trace data is obtained.

Recommended defensive actions

  • Apply the IBM remediation referenced in the vendor advisory for affected TSM releases.
  • Disable application tracing when it is not required, and treat any trace output as sensitive data.
  • Restrict access to trace files, diagnostic bundles, and log collection locations.
  • Review existing trace output for accidental credential exposure and remove or secure any affected artifacts.
  • Rotate any TSM passwords that may have been exposed in trace output.
  • Update operational guidance so troubleshooting workflows avoid collecting unnecessary sensitive data.

Evidence notes

Source data identifies the issue as plain-text password exposure in application trace output when tracing is enabled. NVD lists affected IBM Tivoli Storage Manager version ranges as 7.1.0.0-7.1.6.2, 6.4.0.0-6.4.3.3, and 5.5-6.3.2.5. The CVSS 3.1 vector is AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, and NVD assigns CWE NVD-CWE-noinfo.

Official resources

CVE published in the NVD/CVE record on 2017-02-01 and last modified on 2026-05-13. Timing here reflects the CVE record lifecycle, not PatchSiren publication time.