CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
Low
EPSS
Percentile
39.6%
Node.js Elliptic module is used by IBM App Connect Enterprise Certified Container for encription and signature validation in communication between a Dashboard and COS S3 storage. IBM App Connect Enterprise Certified Container Dashboard operands that use COS S3 storage for storing bar files are vulnerable to loss of confidentiality. This bulletin provides patch information to address the reported vulnerability in the Node.js Elliptic module. [CVE-2024-42459] [CVE-2024-42460] [CVE-2024-42461]
CVEID:CVE-2024-42461
**DESCRIPTION:**Node.js Elliptic module could allow a remote attacker to obtain sensitive information, caused by a flaw with BER-encoded signatures are allowed. By utilizing cryptographic attack techniques, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/350449 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVEID:CVE-2024-42460
**DESCRIPTION:**Node.js Elliptic module could allow a remote attacker to obtain sensitive information, caused by missing check for whether the leading bit of r and s is zero. By utilizing cryptographic attack techniques, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/350448 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVEID:CVE-2024-42459
**DESCRIPTION:**Node.js Elliptic module could allow a remote attacker to obtain sensitive information, caused by missing signature length check. By utilizing cryptographic attack techniques, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/350447 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Affected Product(s) | Version(s) |
---|---|
App Connect Enterprise Certified Container | 5.0-lts |
App Connect Enterprise Certified Container | 7.1 |
App Connect Enterprise Certified Container | 7.2 |
App Connect Enterprise Certified Container | 8.0 |
App Connect Enterprise Certified Container | 8.1 |
App Connect Enterprise Certified Container | 8.2 |
App Connect Enterprise Certified Container | 9.0 |
App Connect Enterprise Certified Container | 9.1 |
App Connect Enterprise Certified Container | 9.2 |
App Connect Enterprise Certified Container | 10.0 |
App Connect Enterprise Certified Container | 10.1 |
App Connect Enterprise Certified Container | 11.0 |
App Connect Enterprise Certified Container | 11.1 |
App Connect Enterprise Certified Container | 11.2 |
App Connect Enterprise Certified Container | 11.3 |
App Connect Enterprise Certified Container | 11.4 |
App Connect Enterprise Certified Container | 11.5 |
IBM strongly suggests the following:
App Connect Enterprise Certified Container up to 11.5.1 (Continuous Delivery)
Upgrade to App Connect Enterprise Certified Container Operator version 11.6.0 or higher, and ensure that all Dashboard components are at 12.0.12.2-r1 or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect/containers_cd?topic=releases-upgrading-operator>
App Connect Enterprise Certified Container 5.0 LTS (Long Term Support)
Upgrade to App Connect Enterprise Certified Container Operator version 5.0.18 or higher, and ensure that all Dashboard components are at 12.0.12.2-r1-lts or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect-contlts?topic=releases-upgrading-operator>
None
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | app_connect_enterprise | 5.0 | cpe:2.3:a:ibm:app_connect_enterprise:5.0:*:*:*:*:*:*:* |
ibm | app_connect_enterprise | 7.1 | cpe:2.3:a:ibm:app_connect_enterprise:7.1:*:*:*:*:*:*:* |
ibm | app_connect_enterprise | 7.2 | cpe:2.3:a:ibm:app_connect_enterprise:7.2:*:*:*:*:*:*:* |
ibm | app_connect_enterprise | 8.0 | cpe:2.3:a:ibm:app_connect_enterprise:8.0:*:*:*:*:*:*:* |
ibm | app_connect_enterprise | 8.1 | cpe:2.3:a:ibm:app_connect_enterprise:8.1:*:*:*:*:*:*:* |
ibm | app_connect_enterprise | 8.2 | cpe:2.3:a:ibm:app_connect_enterprise:8.2:*:*:*:*:*:*:* |
ibm | app_connect_enterprise | 9.0 | cpe:2.3:a:ibm:app_connect_enterprise:9.0:*:*:*:*:*:*:* |
ibm | app_connect_enterprise | 9.1 | cpe:2.3:a:ibm:app_connect_enterprise:9.1:*:*:*:*:*:*:* |
ibm | app_connect_enterprise | 9.2 | cpe:2.3:a:ibm:app_connect_enterprise:9.2:*:*:*:*:*:*:* |
ibm | app_connect_enterprise | 10.0 | cpe:2.3:a:ibm:app_connect_enterprise:10.0:*:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
Low
EPSS
Percentile
39.6%