5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
5.3%
Insufficient input validation in IBM Common Cryptographic Architecture (CCA) may affect Hardware Security Module (HSM) availability. An affected IBM 4767 or IBM 4769 HSM may be forced into a check-stop condition by specially-crafted requests from HSM users. Recovery from a check-stop condition requires manual intervention.
CVEID:CVE-2022-22423
**DESCRIPTION:**IBM Common Cryptographic Architecture (CCA) could allow a local user to cause a denial of service due to improper input validation.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/223596 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)
Affected Product(s) | Platform(s) | Version(s) |
---|---|---|
CCA 5.x MTM for 4767 |
IBM AIX, IBM i, Linux (Intel x86 platforms)
| 5.0.0 - 5.7.11
CCA 7.x MTM for 4769|
IBM AIX, IBM i, IBM PowerLinux, Linux (Intel x86 platforms)
| 7.0.0 - 7.3.43
IBM strongly recommends addressing the vulnerability now by upgrading:
Product(s) | Fixed Version(s) |
---|---|
CCA 5.x MTM for 4767 | 5.7.12 or later |
CCA 7.x MTM for 4769 | 7.3.44 or later |
Platform-specific upgrade information:
IBM AIX
For CCA 5.x for 4767, please download version 5.7.12 or later from the CCA Software Download Page.
For CCA 7.x for 4769, please download version 7.3.44 or later from the CCA Software Download Page.
IBM i
The vulnerability can be fixed by applying a PTF to IBM i. Releases 7.5, 7.4, 7.3, and 7.2 of IBM i will be fixed. Each PTF bundles updates to CCA 5.x MTM for 4767 and CCA 7.x MTM for 4769, bringing their respective firmware levels to 5.7.12 and 7.3.44 or later, respectively.
The PTF numbers containing the fix for this vulnerability are in the following table:
IBM i release|
**5733-CY3 IBM Cryptographic Device Manager for i PTF Number **
—|—
7.5| SI79698
7.4| SI79699
7.3| SI79700
7.2 (4767 Only)| SI79701
IBM PowerLinux
For CCA 7.x for 4769, please download version 7.3.44 or later from the CCA Software Download Page.
**Linux on Intel x86 **
For CCA 5.x for 4767, please download version 5.7.12 or later from the CCA Software Download Page.
For CCA 7.x for 4769, please download version 7.3.44 or later from the CCA Software Download Page.
None
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
5.3%