Lucene search

K
ibmIBM714D5AA70F0F7BA54E7695A8D2F1743009892DB633355009DC8966FC15B278AA
HistorySep 29, 2023 - 11:56 a.m.

Security Bulletin: The IBM® Engineering Lifecycle Engineering product is affected as Java deserialization filters (JEP 290) ignored during IBM ORB deserialization (CVE-2022-40609)

2023-09-2911:56:47
www.ibm.com
9
ibm
engineering lifecycle
java deserialization
ibm orb
jep 290
cve-2022-40609
remote code execution

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

70.1%

Summary

The IBM® Engineering Lifecycle Engineering product is as IBM ORB does not honour JEP 290 deserialization filters when deserializing serialised object data. This exposes the Java process to a variety of attacks ranging from denial of service to remote code execution via “gadgets” in third party components. The fix ensures that the ORB deserializer respects JEP 290 deserialization filters. Following IBM® Engineering Lifecycle Engineering products are vulnerable to this attack, it has been addressed in this bulletin: IBM Engineering Test Management, IBM Engineering Requirements Management DOORS Next, IBM Jazz Reporting Service, IBM Engineering Lifecycle Optimization - Engineering Insights, IBM Engineering Lifecycle Optimization - Publishing

Vulnerability Details

Refer to the security bulletin(s) listed in the Remediation/Fixes section

Affected Products and Versions

Affected Product(s) Version(s)
IBM Engineering Test Management 7.0.1
IBM Engineering Lifecycle Optimization - Publishing
IBM Jazz Reporting Service
IBM Engineering Requirements Management DOORS Next
IBM Engineering Lifecycle Optimization - Engineering Insights
IBM Engineering Test Management 7.0.2
IBM Engineering Lifecycle Optimization - Publishing
IBM Jazz Reporting Service
IBM Engineering Requirements Management DOORS Next
IBM Engineering Lifecycle Optimization - Engineering Insights

Remediation/Fixes

If any of the mentioned affected product is deployed on one of the above versions, Please follow the instruction given in the following article.

Link: <https://www.ibm.com/support/pages/node/7017032&gt;

How to update the IBM SDK for Java of Engineering Lifecycle Management products? Please refer below article for more details.

<https://www.ibm.com/support/pages/how-update-ibm-sdk-java-engineering-lifecycle-management-products&gt;

Affected Releases
-----------------
7.1.5.18 and earlier
8.0.8.0 and earlier

Fixed Releases
--------------
7.1.5.19 and later (access restricted to products with an extended support agreement in place with IBM Runtimes)
8.0.8.5 and later

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmibm_engineering_lifecycle_management_baseMatch6.0.6
OR
ibmibm_engineering_lifecycle_management_baseMatch6.0.6.1
OR
ibmibm_engineering_lifecycle_management_baseMatch7.0
OR
ibmibm_engineering_lifecycle_management_baseMatch7.0.1
OR
ibmibm_engineering_lifecycle_management_baseMatch7.0.2

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

70.1%

Related for 714D5AA70F0F7BA54E7695A8D2F1743009892DB633355009DC8966FC15B278AA