Lucene search

K
ibmIBM91EF7058F5F1AFCA55A4E576E8ECE3E55BC1994F40C49D2724D73F1F04CF118C
HistoryJan 05, 2024 - 4:45 p.m.

Security Bulletin: Vulnerability in Brix crypto-js affects IBM Process Mining CVE-2023-46233

2024-01-0516:45:03
www.ibm.com
13
vulnerability
brix crypto-js
ibm process mining
weak cryptographic hash algorithm
remote attacker
sensitive information
cve-2023-46233
security fixes
affected products
open source updates
remediation
upgrade
red hat openshift
passportadvantage

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

6.8 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.6%

Summary

There is a vulnerability in Brix crypto-js that could allow an remote attacker to obtain sensitive information. The code is used by IBM Process Mining. This bulletin identifies the security fixes to apply to address the vulnerability.

Vulnerability Details

CVEID:CVE-2023-46233
**DESCRIPTION:**Brix crypto-js could allow a remote attacker to obtain sensitive information, caused by the use of a weak cryptographic hash algorithm. By utilize cryptographic attack techniques, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
CVSS Base score: 9.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/269753 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Process Mining

1.14.1, 1.14.2, 1.14.2 IF001

Remediation/Fixes

Any open source library may be included in one or more sub-components of IBM Process Mining. Open source updates are not always synchronized across all components. The CVE in this bulletin are specifically addressed by

CVE/ X-Force ID Addressed in component
CVE-2023-46233 Process Mining
Product(s) **Version(s) number and/or range ** Remediation/Fix/Instructions
IBM Process Mining containers

1.14.1, 1.14.2, 1.14.2 IF001

| **Install/Upgrade to version 1.14.3

Installing a Production deployment
1.**To deploy a Production deployment, see installing on
RedHat OpenShift Container Platform environments

**Upgrading an Installation **** **1.To perform an upgrade of a Production deployment, see
upgrading in Red Hat OpenShift Container Platform
environments
IBM Process Mining traditional|

1.14.1, 1.14.2

| **Install/Upgrade to version 1.14.3

** 1.Login to PassPortAdvantage
2.Search for
M0GXPML Process Mining 1.14.3 Server Multiplatform
Multilingual
3.Download package
4.Follow install instructions
5.Repeat for M0GXQML Process Mining 1.14.3 Client
Windows Multilingual

Workarounds and Mitigations

None known

Affected configurations

Vulners
Node
ibmworkflow_process_serviceMatch1.14.1
OR
ibmworkflow_process_serviceMatch1.14.2
OR
ibmworkflow_process_serviceMatch1.14.2
OR
ibmworkflow_process_serviceMatch001

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

6.8 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.6%

Related for 91EF7058F5F1AFCA55A4E576E8ECE3E55BC1994F40C49D2724D73F1F04CF118C