PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-6099 IBM CVE debrief

CVE-2016-6099 is a medium-severity information disclosure issue in IBM Tivoli Key Lifecycle Manager 2.5 and 2.6. IBM and NVD describe the flaw as exposing sensitive information to unauthorized users, which could help attackers plan or carry out follow-on activity against the system. The NVD record assigns a CVSS 3.0 score of 5.3 with a network-based, low-complexity attack path and no privileges or user interaction required.

Vendor
IBM
Product
CVE-2016-6099
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-02
Original CVE updated
2026-05-13
Advisory published
2017-02-02
Advisory updated
2026-05-13

Who should care

Administrators and security teams responsible for IBM Tivoli Key Lifecycle Manager deployments, especially environments that store or manage sensitive key material, credentials, or other security-related data.

Technical summary

NVD classifies the issue as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) with CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. The source corpus ties the vulnerability to IBM Tivoli Key Lifecycle Manager 2.5 and 2.6, and NVD lists affected CPE criteria across the 2.5.0 and 2.6.0 release lines. The impact is confidentiality-only at the CVSS level, but the disclosed information may support additional attacks if the affected system is reachable by unauthorized users.

Defensive priority

Medium. Apply IBM’s fix and review exposure promptly, with higher urgency for internet-reachable deployments or systems handling sensitive security material.

Recommended defensive actions

  • Apply the IBM patch or mitigation referenced in the vendor advisory.
  • Restrict access to the management interface and any related administrative endpoints to trusted networks and administrators only.
  • Review logs for unusual access to pages, endpoints, or responses that could expose sensitive data.
  • If sensitive data may have been exposed, assess whether secrets, keys, credentials, or related configuration should be rotated or reissued.
  • Confirm all IBM Tivoli Key Lifecycle Manager instances in the 2.5 and 2.6 lines are covered by remediation or compensating controls.

Evidence notes

The debrief is based on the official NVD record and the IBM vendor advisory referenced there. NVD lists CVSS 3.0 vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N and CWE-200. The source record was published on 2017-02-02 and last modified on 2026-05-13. NVD also references IBM PSIRT advisory docview.wss?uid=swg21997924 and a SecurityFocus BID entry as supporting references.

Official resources

Publicly disclosed in the source record on 2017-02-02; the NVD entry was last modified on 2026-05-13.