Lucene search

K
ibmIBM94A5EAD2AABE10D8AAA1B85ABE8D9AB1090736FBD08E6B72EE5BAB165F23B881
HistoryDec 22, 2022 - 8:25 a.m.

Security Bulletin: Vulnerability (CVE-2021-2163) in IBM Java Runtime affects CICS Transaction Gateway Desktop Editon

2022-12-2208:25:16
www.ibm.com
21
ibm java runtime
vulnerability
cve-2021-2163
cics transaction gateway desktop edition
fixes
updated jre
fix central link

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

0.002 Low

EPSS

Percentile

61.0%

Summary

IBM® Runtime Environment Java™ is used by CICS Transaction Gateway Desktop Editon. The fix removes vulnerability CVE-2021-2163 that could allow an unauthenticated attacker to cause no confidentiality impact, high integrity impact, and no availability impact.

Vulnerability Details

CVEID:CVE-2021-2163
**DESCRIPTION:**An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to cause no confidentiality impact, high integrity impact, and no availability impact.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/200292 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
CICS Transaction Gateway Desktop Edition All

Remediation/Fixes

IBM recommends you apply these fixes.

Product

| VRMF|APAR|Remediation / First Fix
—|—|—|—
CICS Transaction Gateway Desktop Edition| 9.2| Updated JRE’s have been made available on Fix Central as Fix packs.|

AIX: Fix Central Link

pLinux: Fix Central Link

xLinux: Fix Central Link

zLinux: Fix Central Link

Windows: Fix Central Link

CICS Transaction Gateway Desktop Edition| 9.1| Updated JRE’s have been made available on Fix Central as Fix packs.|

AIX: Fix Central Link

pLinux: Fix Central Link

xLinux: Fix Central Link

zLinux: Fix Central Link

Windows: Fix Central Link

CICS Transaction Gateway Desktop Edition|

9.0

| Updated JRE’s have been made available on Fix Central as Fix packs.|

AIX: Fix Central Link

pLinux: Fix Central Link

xLinux: Fix Central Link

zLinux: Fix Central Link

Windows: Fix Central Link

Solaris: Fix Central Link

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmcics_transaction_gatewayMatch9.0.0
OR
ibmcics_transaction_gatewayMatch9.1.0
OR
ibmcics_transaction_gatewayMatch9.2.0

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

0.002 Low

EPSS

Percentile

61.0%