PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-5966 IBM CVE debrief

CVE-2016-5966 describes a missing HTTP Strict Transport Security (HSTS) control in IBM Security Privileged Identity Manager Virtual Appliance. According to the NVD record, this weakness can expose sensitive information to a remote attacker using man-in-the-middle techniques. NVD rates the issue as CVSS 3.0 5.9 (Medium), with network attack vector and no privileges or user interaction required.

Vendor
IBM
Product
CVE-2016-5966
CVSS
MEDIUM 5.9
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-01
Original CVE updated
2026-05-13
Advisory published
2017-02-01
Advisory updated
2026-05-13

Who should care

Organizations running IBM Security Privileged Identity Manager Virtual Appliance 2.0.2 or 2.1, especially where the appliance is reachable over untrusted networks or where users may connect over paths that could be intercepted.

Technical summary

NVD maps the vulnerability to CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and lists affected CPEs for IBM Security Privileged Identity Manager 2.0.2 and 2.1. The core issue is that HTTP Strict Transport Security was not properly enabled, which can leave clients more exposed to SSL/TLS downgrade or interception scenarios and permit sensitive data disclosure if a network attacker can place themselves in the traffic path. The published CVSS vector is CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N.

Defensive priority

Medium. This is an information-disclosure risk rather than an integrity or availability issue, but it still matters where the appliance handles credentials, tokens, or other sensitive administrative data over web sessions.

Recommended defensive actions

  • Review the IBM vendor advisory and apply the patch or remediation guidance referenced for CVE-2016-5966.
  • Verify whether Security Privileged Identity Manager Virtual Appliance versions 2.0.2 or 2.1 are in use and prioritize them for remediation if so.
  • Confirm that HTTPS is enforced end-to-end and that HSTS is enabled on affected web-facing services where supported.
  • Inspect adjacent network paths and client access patterns for any exposure to interception risk until remediation is complete.
  • If immediate patching is not possible, restrict access to the appliance to trusted network paths and monitored management channels.

Evidence notes

The debrief is based only on the supplied NVD-derived corpus and the referenced official/vendor links. The corpus states that IBM Security Privileged Identity Manager Virtual Appliance could allow a remote attacker to obtain sensitive information because HTTP Strict Transport Security was not properly enabled. NVD lists affected versions 2.0.2 and 2.1, CWE-200, and CVSS 3.0 vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N. IBM vendor advisory and SecurityFocus entries are referenced by NVD, but no additional unsupported claims are used here.

Official resources

CVE-2016-5966 was published in the source corpus on 2017-02-01T20:59:01.410Z, with IBM advisory references included in the NVD record. Use the published date for timing context; no later generation or review date is treated as the issue's C