CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
35.7%
The IBM App Connect Enterprise Certified Container image that provides the mapping assistance capability to the DesignerAuthoring operand includes several Python based Red Hat packages that contain vulnerabilites. IBM App Connect Enterprise Certified Container DesignerAuthoring operands that use mapping assistance are vulnerable to arbitrary code execution. This bulletin provides patch information to address the reported vulnerabilities in the Red Hat packages. [CVE-2022-48622] [CVE-2023-23931] [CVE-2024-35195] [CVE-2024-39689]
CVEID:CVE-2022-48622
**DESCRIPTION:**GNOME GdkPixbuf could allow a remote attacker to execute arbitrary code on the system, caused by a heap memory corruption in the ani_load_chunk function in io-ani.c. By persuading a victim to open a specially crafted .ani file, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
CVSS Base score: 7.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/281182 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVEID:CVE-2023-23931
**DESCRIPTION:**PyPI cryptography package could allow a remote attacker to bypass security restrictions, caused by a memory corruption in Cipher.update_into. By passing an immutable python object as the outbuf, an attacker could exploit this vulnerability to bypass authentication and obtain access.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/246738 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)
CVEID:CVE-2024-35195
**DESCRIPTION:**Psf Requests could allow a local authenticated attacker to bypass security restrictions, caused by an incorrect control flow implementation vulnerability. If the first request in a session is made with verify=False, all subsequent requests to the same host will continue to ignore cert verification. An attacker could exploit this vulnerability to launch further attacks on the system.
CVSS Base score: 10
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/291111 for the current score.
CVSS Vector:
CVEID:CVE-2024-39689
**DESCRIPTION:**Certifi python-certifi could provide weaker than expected security, caused by the use of GLOBALTRUST root certificate. An attacker could exploit this vulnerability to launch further attacks on the system.
CVSS Base score: 10
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/297375 for the current score.
CVSS Vector:
Affected Product(s) | Version(s) |
---|---|
App Connect Enterprise Certified Container | 5.0-lts |
App Connect Enterprise Certified Container | 7.1 |
App Connect Enterprise Certified Container | 7.2 |
App Connect Enterprise Certified Container | 8.0 |
App Connect Enterprise Certified Container | 8.1 |
App Connect Enterprise Certified Container | 8.2 |
App Connect Enterprise Certified Container | 9.0 |
App Connect Enterprise Certified Container | 9.1 |
App Connect Enterprise Certified Container | 9.2 |
App Connect Enterprise Certified Container | 10.0 |
App Connect Enterprise Certified Container | 10.1 |
App Connect Enterprise Certified Container | 11.0 |
App Connect Enterprise Certified Container | 11.1 |
App Connect Enterprise Certified Container | 11.2 |
App Connect Enterprise Certified Container | 11.3 |
App Connect Enterprise Certified Container | 11.4 |
App Connect Enterprise Certified Container | 11.5 |
App Connect Enterprise Certified Container | 11.6 |
App Connect Enterprise Certified Container | 12.0 |
App Connect Enterprise Certified Container | 12.1 |
IBM strongly suggests the following:
App Connect Enterprise Certified Container up to 12.1.0 (Continuous Delivery)
Upgrade to App Connect Enterprise Certified Container Operator version 12.2.0 or higher, and ensure that all DesignerAuthoring components are at 12.0.12.4-r1 or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect/containers_cd?topic=releases-upgrading-operator>
App Connect Enterprise Certified Container 12.0 LTS (Long Term Support)
Upgrade to App Connect Enterprise Certified Container Operator version 12.0.2 or higher, and ensure that all DesignerAuthoring components are at 12.0.12-r2 or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect/12.0?topic=umfpr-upgrading-operator-releases>
App Connect Enterprise Certified Container 5.0 LTS (Long Term Support)
Upgrade to App Connect Enterprise Certified Container Operator version 5.0.19 or higher, and ensure that all DesignerAuthoring components are at 12.0.12.3-r1-lts or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect-contlts?topic=releases-upgrading-operator>
None
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
35.7%