Impact
IBM Concert versions 1.0.0 to 2.2.0 generate temporary files whose names are predictable. A local user can create a symbolic link pointing to an arbitrary file and trigger the application to write to the temporary location, resulting in the targeted file being overwritten. This allows the local attacker to replace or modify executable or configuration files, potentially compromising the integrity of the application or the host system. The weakness is a classic insecure temporary storage issue, corresponding to CWE-340.
Affected Systems
The vulnerability applies to IBM Concert Software from version 1.0.0 through 2.2.0, inclusive. Any deployment of these versions, regardless of operating system, is affected.
Risk and Exploitability
The CVSS score of 6.2 indicates moderate risk, while an EPSS score of less than 1% suggests a very low probability of current exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires local user access; there is no network-based attack vector mentioned. Based on the description, the likely attack scenario involves a local malicious user or compromised process creating a symbolic link before the application runs.
OpenCVE Enrichment