Lucene search

K
ibmIBM190C6D0EA2E04E32B70D4F1BF09C443547F34568AABEFDA088CC43E67EFA7110
HistoryAug 09, 2024 - 5:50 a.m.

Security Bulletin: IBM Sterling Connect:Direct Web Service is affected by Java JWT vulnerability

2024-08-0905:50:51
www.ibm.com
9
ibm sterling
direct web service
jjwt vulnerability
upgrade
cve-2024-31033
remediation

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

AI Score

6.5

Confidence

Low

Summary

IBM Sterling Connect:Direct Web Service is vulnerable to JJWT version 0.9.1. Connect:Direct Web Services has upgraded to version 0.12.5 to address CVE-2024-31033.

Vulnerability Details

CVEID:CVE-2024-31033
**DESCRIPTION:**An unspecified error with ignoring certain characters in jwtk JJWT (aka Java JWT) has an unknown impact and attack vector.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/286924 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling Connect:Direct Web Services 6.1.0
IBM Sterling Connect:Direct Web Services (Certified Container) All
IBM Sterling Connect:Direct Web Services 6.3.0
IBM Connect:Direct Web Services 6.0
IBM Sterling Connect:Direct Web Services 6.2.0

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading …

Product(s)|Version(s)|**Remediation/Fix
**
—|—|—
IBM Sterling Connect:Direct Web Services| 6.3| Apply 6.3.0.9, available on Fix Central
IBM Sterling Connect:Direct Web Services| 6.1| Apply 6.1.0.25, available on Fix Central
IBM Sterling Connect:Direct Web Services (Certified Container)| All| Container release Updated with 6.3.0.9
IBM Sterling Connect:Direct Web Services| 6.2| Apply 6.2.0.24, available on Fix Central
IBM Sterling Connect:Direct Web Services| 6.0| Upgrade to 6.1.0.25, 6.2.0.24, or 6.3.0.9

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmsterling_connect\Matchdirect6.1
VendorProductVersionCPE
ibmsterling_connect\directcpe:2.3:a:ibm:sterling_connect\:direct:6.1:*:*:*:*:*:*:*

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

AI Score

6.5

Confidence

Low

Related for 190C6D0EA2E04E32B70D4F1BF09C443547F34568AABEFDA088CC43E67EFA7110