Lucene search

K
ibmIBM10C905DC3AFB7D99319B4CBD780973DB013F5775256175293F1755944BC06AAC
HistoryAug 01, 2023 - 1:39 p.m.

Security Bulletin: The IBM® Engineering Lifecycle Engineering products using IBM Java versions 8.0.7.0 - 8.0.7.11 are vulnerable to crypto attacks. (CVE-2023-30441)

2023-08-0113:39:10
www.ibm.com
9
ibm
engineering lifecycle
crypto attacks
java 8.0.7.0 - 8.0.7.11
vulnerability
jazz foundation
test management
workflow management
requirements management
cve-2023-30441
tls servers
security provider
remediation
ibm sdk

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

57.2%

Summary

IBM Java versions 8.0.7.0 - 8.0.7.1 has a combination of two flaws in the JSSE component and IBMJCEPlus security provider expose some IBM Java releases to various cryptographic attacks when acting as a TLS server. Following IBM® Engineering Lifecycle Engineering products are vulnerable to this attack, it has been addressed in this bulletin: Jazz Foundation, IBM Engineering Test Management, IBM Engineering Workflow Management, IBM Engineering Requirements Management DOORS Next.

Vulnerability Details

Refer to the security bulletin(s) listed in the Remediation/Fixes section

Affected Products and Versions

Affected Product(s) Version(s)
Jazz Foundation 7, 7.0.1, 7.0.2
IBM Engineering Test Management 7.0.1, 7.0.2
IBM Engineering Workflow Management
IBM Engineering Requirements Management DOORS Next

Remediation/Fixes

CVE-2023-30441 may affect IBM® Engineering Lifecycle Engineering products mentioned above, which uses IBM Java versions 8.0.7.0 - 8.0.7.11.

This issue affects products and applications which act as TLS servers, and have the IBMJCEPlus security provider listed above the IBMJCE provider in the security provider list (e.g. in /jre/lib/security/java.security). This is the default configuration from IBM Java 8.0.7.0 onwards.

If any of the mentioned affected product is deployed on one of the above versions, Please follow the instruction given in the following article.

Link: <https://www.ibm.com/support/pages/node/6985011&gt;

How to update the IBM SDK for Java of Engineering Lifecycle Management products? Please refer below article for more details.

<https://www.ibm.com/support/pages/how-update-ibm-sdk-java-engineering-lifecycle-management-products&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmibm_engineering_lifecycle_management_baseMatch6.0.6
OR
ibmibm_engineering_lifecycle_management_baseMatch6.0.6.1
OR
ibmibm_engineering_lifecycle_management_baseMatch7.0
OR
ibmibm_engineering_lifecycle_management_baseMatch7.0.1
OR
ibmibm_engineering_lifecycle_management_baseMatch7.0.2

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

57.2%

Related for 10C905DC3AFB7D99319B4CBD780973DB013F5775256175293F1755944BC06AAC