Lucene search

K
ibmIBMB664731836854A3AB368802E7FA40369AA19E74F318316143D61D9DA753EDC56
HistoryJul 29, 2024 - 12:14 p.m.

Security Bulletin: Sterling Control Center v6.2.1 is vulnerable due to Apache ActiveMQ issue

2024-07-2912:14:07
www.ibm.com
17
ibm sterling control center
apache activemq
cve-2023-46604
vulnerability
upgrade
security patch

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H

AI Score

8.1

Confidence

Low

EPSS

0.969

Percentile

99.8%

Summary

Sterling Control Center v6.2.1 is dependent on Apache ActiveMQ, which is vulnerable to CVE-2023-46604.

Vulnerability Details

CVEID:CVE-2023-46604
**DESCRIPTION:**Apache ActiveMQ and ActiveMQ Legacy OpenWire Module could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization in the class types in the OpenWire protocol. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 9.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/269795 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Control Center 6.2.1
IBM Control Center 6.3.0

Remediation/Fixes

Product

|

Version

|

Remediation

—|—|—

IBM Sterling Control Center

|

6.2.1.0 GA through iFix13

|

6.2.1.0 iFix13 Fix Central - 6.2.1.0

IBM Sterling Control Center

|

6.3.0.0 GA through iFix06

|

6.3.0.0 iFix06 Fix Central - 6.3.0.0

Workarounds and Mitigations

  • In 6.2.1, Apache Active MQ version is upgraded to 5.16.7 which has the fix for the mentioned vulnerability.
  • In 6.3.0, Apache Active MQ version is upgraded to 5.16.7 which has the fix for the mentioned vulnerability.
  • Remediation Fix is also available with latest release of v6.3.1.0 and later as well.

Note: We encourage our customers with EOS v6.1.3.0 and v6.3.0.0 to upgrade to the latest release as they will not be receiving security patches.

Affected configurations

Vulners
Node
ibmcontrol_centerMatch6.2.1.0
VendorProductVersionCPE
ibmcontrol_center6.2.1.0cpe:2.3:a:ibm:control_center:6.2.1.0:*:*:*:*:*:*:*

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H

AI Score

8.1

Confidence

Low

EPSS

0.969

Percentile

99.8%