9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.031 Low
EPSS
Percentile
90.9%
Vulnerabilities in VMware vCenter affect IBM Cloud Pak System. This bulletin identifies the steps to take to address the vulnerability.
CVEID:CVE-2023-34048
**DESCRIPTION:**VMware vCenter Server and Cloud Foundation could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write flaw. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/269446 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID:CVE-2023-34056
**DESCRIPTION:**VMware vCenter Server and Cloud Foundation could allow a remote authenticated attacker to obtain sensitive information, caused by improper authorization validation. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
CVSS Base score: 4.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/269447 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM Cloud Pak System Software Suite | 2.3.3.0 - 2.3.3.6 Interim Fix 1 (Intel) |
IBM Cloud Pak System | 2.3.3.0 - 2.3.3.6 Interim Fix 1 (Intel) |
Critical code execution vulnerabilities have been found in VMWare vCenter. In response to these vulnerabilities Cloud Pak System provides a new vCenter Image update to vCenter Windows version 6.7.0 U3t with Cloud Pak System 2.3.3.6 Interim Fix 2.
IBM strongly recommends addressing the vulnerability now by upgrading to IBM Cloud Pak System v2.3.3.6 Interim Fix2.
For IBM Cloud Pak System v2.3.3.0 through v2.3.3.6
upgrade to Cloud Pak System 2.3.3.6. Ifix1, apply IBM Cloud Pak System v2.3.3.6 Interim Fix 2 at Fix Central.
information on upgrading here <https://www.ibm.com/support/pages/node/7017280>
For IBM Cloud Pak System V2.3.3.6 Interim Fix1,
Apply Cloud Pak System V2.3.3.6 Interim Fix 2 at Fix Central
information on upgrading available at <http://www.ibm.com/support/docview.wss?uid=ibm10887959>
None
CPE | Name | Operator | Version |
---|---|---|---|
ibm cloud pak system software | eq | 2.3.3 |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.031 Low
EPSS
Percentile
90.9%