Lucene search

K
ibmIBM0938A470DF469058C30E2F642529541A6B0D0159A1C32DEF4850E33B8FCFF566
HistoryAug 13, 2024 - 8:38 a.m.

Security Bulletin: IBM Sterling Control Center v6.2.1 and v6.3.1 is vulnerable and reported in [All] Spring Framework.

2024-08-1308:38:22
www.ibm.com
2
ibm sterling control center
v6.2.1
v6.3.1
vulnerable
denial of service
spring framework
cve-2024-22233
fix central
upgrade
eos v6.1.3.0

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.7

Confidence

High

Summary

Security Bulletin: Sterling Control Center v6.2.1 and v6.3.1 is vulnerable in [All] Spring Framework for CVE-2024-22233 (Publicly disclosed vulnerability).

Vulnerability Details

CVEID:CVE-2024-22233
**DESCRIPTION:**VMware Tanzu Spring Framework is vulnerable to a denial of service, caused by a flaw when application uses Spring MVC and Spring Security 6.1.6+ or 6.2.1+ is on the classpath. By sending specially crafted HTTP requests, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/280184 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Control Center 6.3.1

Remediation/Fixes

Product

|

Version

|

Remediation

—|—|—

IBM Sterling Control Center

|

6.3.1.0 GA through iFix02

|

6.3.1.0 iFix02 Fix Central - 6.3.1.0

Workarounds and Mitigations

  • This vulnerability is reported in Spring framework 6.0.15 and fixed in 6.0.16. It is fixed with upgrade of Spring to 6.0.18 in 6.3.1 ifix02. (Reference link 1)
  • Older versions are not affected, Control Center 6.2.1 uses spring framework 5.x.x version and this vulnerability is reported for 6.0.15 and 6.1.2. (Reference link 2).
  • Remediation Fix is also available with latest release of v6.3.1.0 and later as well.

Note: We encourage our customers with EOS v6.1.3.0 and v6.3.0 to upgrade to the latest release as they will not be receiving security patches.

Affected configurations

Vulners
Node
ibmcontrol_centerMatch6.3.1.0
VendorProductVersionCPE
ibmcontrol_center6.3.1.0cpe:2.3:a:ibm:control_center:6.3.1.0:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.7

Confidence

High

Related for 0938A470DF469058C30E2F642529541A6B0D0159A1C32DEF4850E33B8FCFF566