IBM MQ Appliance has remedied a password hash that provides insufficient protection.
CVEID:CVE-2022-22321
**DESCRIPTION:**IBM MQ Appliance local messaging users stored with a password hash that provides insufficient protection.
CVSS Base score: 5.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/218368 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM MQ Appliance | 9.2 CD |
IBM MQ Appliance | 9.2 LTS |
This vulnerability is addressed under APAR IT39829.
IBM strongly recommends addressing the vulnerability now.
IBM MQ Appliance version 9.2 LTS
Apply fixpack 9.2.0.5, or later firmware.
IBM MQ Appliance version 9.2 CD
Upgrade to 9.2.5 CD, or later firmware.
Additional steps
Passwords for local messaging users set prior to installation of the indicated firmware versions should be updated.
See IBM Documentation for the IBM MQ Appliance for further details on updating local messaging user passwords.
There are two types of user on the IBM MQ Appliance: appliance users, and messaging users. Appliance users are users that can administer the appliance and IBM MQ resources. Messaging users are users that can perform operations on messaging resources.
Only internally stored messaging users are affected.