Lucene search

K
ibmIBM3029E681B9699476EDC38A45B92B0EC9764103635FC7D844D489E0BA869FAD79
HistoryOct 31, 2023 - 2:35 a.m.

Security Bulletin: IBM Event Processing is vulnerable to a denial of service

2023-10-3102:35:54
www.ibm.com
20
ibm event processing
vulnerability
denial of service
cve-2023-4853
upgrade

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.6

Confidence

High

EPSS

0.002

Percentile

64.9%

Summary

Operator of IBM Event Processing is vulnerable to an unauthorized endpoint access and possibly a denial of service. (CVE-2023-4853)

Vulnerability Details

CVEID:CVE-2023-4853
**DESCRIPTION:**Quarkus could allow a remote attacker to bypass security restrictions, caused by improper sanitization of requests. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass the security policy altogether.
CVSS Base score: 8.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/266748 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Event Processing 1.0.0-1.0.3

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading

Upgrade to IBM Event Processing 1.0.4 by following the upgrading and migrating documentation.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmevent_streamsMatchany

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.6

Confidence

High

EPSS

0.002

Percentile

64.9%

Related for 3029E681B9699476EDC38A45B92B0EC9764103635FC7D844D489E0BA869FAD79