PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-8942 IBM CVE debrief

CVE-2016-8942 is a low-severity authorization weakness affecting IBM Tivoli Storage Productivity Center and related IBM Spectrum Control versions listed by NVD. The issue allows an authenticated user with intimate knowledge of the system to edit a limited set of server properties, creating an integrity risk rather than a confidentiality or availability issue in the supplied CVSS record.

Vendor
IBM
Product
CVE-2016-8942
CVSS
LOW 3.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-01
Original CVE updated
2026-05-13
Advisory published
2017-02-01
Advisory updated
2026-05-13

Who should care

Administrators and security teams responsible for IBM Tivoli Storage Productivity Center or IBM Spectrum Control deployments should review this issue, especially where multiple authenticated users have access to administrative or operational functions.

Technical summary

NVD classifies the weakness as CWE-284 (Improper Access Control) with CVSS v3.0 vector AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N. The described impact is limited to unauthorized changes to a narrow set of server properties by an authenticated user who has intimate knowledge of the system. NVD also links an IBM PSIRT advisory and a SecurityFocus entry, and lists multiple affected IBM TSPC/Spectrum Control versions.

Defensive priority

Low immediate urgency, but it should be handled in normal vendor patching and access-control review cycles for any affected IBM deployment.

Recommended defensive actions

  • Inventory IBM Tivoli Storage Productivity Center and IBM Spectrum Control instances and compare installed versions against the affected versions listed in the NVD record.
  • Review the IBM PSIRT advisory referenced by NVD for vendor remediation guidance and apply the recommended update or mitigation.
  • Restrict access to authenticated accounts that can administer or alter server properties, and periodically review those accounts.
  • Audit property-change activity on affected servers and alert on unexpected configuration edits.
  • If the product is still in use, plan a supported upgrade path; if it is not, prioritize migration off the affected software.

Evidence notes

This debrief is grounded in the supplied NVD CVE record, which states the issue description, CVSS vector, CWE-284 classification, and the affected IBM CPE versions. The record references an IBM vendor advisory and a SecurityFocus BID entry. No KEV entry or ransomware campaign linkage was provided in the supplied enrichment.

Official resources

The CVE was published on 2017-02-01 and later modified on 2026-05-13. Use the published date as the issue date; the later modified date reflects record maintenance, not initial disclosure. The supplied enrichment does not indicate KEV or a,