Lucene search

K
ibmIBM8A6964E6A535C89E2E7103299D447D3F4153F5B9CEF88F372586897AD71D0A07
HistoryFeb 28, 2022 - 3:10 p.m.

Security Bulletin: IBM MQ Appliance affected by a password hash that provides insufficient protection (CVE-2022-22321)

2022-02-2815:10:03
www.ibm.com
18
ibm mq appliance
insufficient protection
cve-2022-22321
password hash
firmware upgrade

EPSS

0

Percentile

12.6%

Summary

IBM MQ Appliance has remedied a password hash that provides insufficient protection.

Vulnerability Details

CVEID:CVE-2022-22321
**DESCRIPTION:**IBM MQ Appliance local messaging users stored with a password hash that provides insufficient protection.
CVSS Base score: 5.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/218368 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM MQ Appliance 9.2 CD
IBM MQ Appliance 9.2 LTS

Remediation/Fixes

This vulnerability is addressed under APAR IT39829.

IBM strongly recommends addressing the vulnerability now.

IBM MQ Appliance version 9.2 LTS

Apply fixpack 9.2.0.5, or later firmware.

IBM MQ Appliance version 9.2 CD

Upgrade to 9.2.5 CD, or later firmware.

Additional steps

Passwords for local messaging users set prior to installation of the indicated firmware versions should be updated.
See IBM Documentation for the IBM MQ Appliance for further details on updating local messaging user passwords.

Workarounds and Mitigations

There are two types of user on the IBM MQ Appliance: appliance users, and messaging users. Appliance users are users that can administer the appliance and IBM MQ resources. Messaging users are users that can perform operations on messaging resources.

Only internally stored messaging users are affected.

EPSS

0

Percentile

12.6%

Related for 8A6964E6A535C89E2E7103299D447D3F4153F5B9CEF88F372586897AD71D0A07