Lucene search

K
ibmIBM1FC80D1604C8878668B7ACFB95635A129154D5B5F74C0E41A9B7B9FC2A7D86BD
HistoryJan 03, 2024 - 5:53 p.m.

Security Bulletin: CICS Transaction Gateway Containers are vulnerable to unwanted system calls such as unshare() (CVE-2022-0185).

2024-01-0317:53:37
www.ibm.com
16
cics transaction gateway
cve-2022-0185
seccomp
ibm
linux
container
vulnerability

8.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

7.2 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

25.6%

Summary

CICS Transaction Gateway Containers are vulnerable to CVE-2022-0185 if the SECCOMP profile is not configured so as to disable unwanted system calls such as unshare().

Vulnerability Details

CVEID:CVE-2022-0185
**DESCRIPTION:**Linux Kernel is vulnerable to a heap-based buffer overflow, caused by an integer underflow in the legacy_parse_param function in fs/fs_context.c. By sending a specially-crafted request, a local authenticated attacker could overflow a buffer and execute arbitrary code on the system with root privileges.
CVSS Base score: 7.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/217455 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM CICS Transaction Gateway 9.3

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.

Product

| VRMF|Platforms|Remediation/First Fix
—|—|—|—
CICS Transaction Gateway for Multiplatforms| 9.3.0.0| Linux on IBM Z container |

System calls directly interact with underlying OS kernel which enables an attacker to perform malicious unintended activity once a threat actor gains access into the cluster. Seccomp restricts an attacker’s access to a limited set of syscalls from the CICS TG container. Seccomp for CICS Transaction Gateway containers can be created by following the instructions in Seccomp profiles for CICS Transaction Gateway Containers.

CICS Transaction Gateway for Multiplatforms | 9.3.0.0| Linux on Intel container

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmcics_transaction_gatewayMatch9.3
CPENameOperatorVersion
cics transaction gatewayeq9.3

8.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

7.2 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

25.6%