6.2 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.0004 Low
EPSS
Percentile
5.1%
An issue was identified with IBM MQ tracing logic that meant under certain circumstances sensitive data could be captured while IBM MQ trace was running. This data would be stored in plain text within the IBM MQ trace files.
CVEID:CVE-2023-28514
**DESCRIPTION:**IBM MQ could allow a local user to obtain sensitive credential information when a detailed technical error message is returned in a stack trace.
CVSS Base score: 6.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/250398 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM MQ | 8.0 |
IBM MQ | 9.0 LTS |
IBM MQ | 9.1 CD |
IBM MQ | 9.1 LTS |
The following installable MQ components are affected by the vulnerability:
- Runtime
If you are running any of these listed components, please apply the remediation/fixes as described below. For more information on the definitions of components used in this list see <https://www.ibm.com/support/pages/installable-component-names-used-ibm-mq-security-bulletins>
This issue was resolved under APAR IT43079
IBM MQ 8.0
Users with an appropriate extended support entitlement should contact IBM support.
IBM MQ 9.0 LTS
Apply cumulative security update 9.0.0.16
IBM MQ 9.1 LTS
IBM MQ 9.1 CD
Upgrade to IBM MQ 9.1.4 CD or later
None
6.2 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.0004 Low
EPSS
Percentile
5.1%