Lucene search

K
ibmIBMCA480D0E529A5FECA44A05ACA96C924A4DAA4D9FB2C0EC4CE0352573999CF1B8
HistoryJan 03, 2024 - 9:30 a.m.

Security Bulletin: CICS Transaction Gateway Containers are vulnerable to Unrestricted Internet Access/Outbound Connections (CVE-2023-47140).

2024-01-0309:30:53
www.ibm.com
17
cics transaction gateway
vulnerability
unrestricted internet access
outbound connections
ibm
network policy
data leakage
containerized deployment
cve-2023-47140

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

6.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.5%

Summary

CICS Transaction Gateway Containers are vulnerable to CVE-2023-47140 if proper egress/ingress policies are not configured at either POD or HOST level.

Vulnerability Details

CVEID:CVE-2023-47140
**DESCRIPTION:**IBM CICS Transaction Gateway could allow a user to transfer or view files due to improper access controls.
CVSS Base score: 4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/270259 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM CICS Transaction Gateway Containers 9.3

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.

Product

| VRMF|Platforms|Remediation/First Fix
—|—|—|—
CICS Transaction Gateway for Multiplatforms| 9.3.0.0| Linux on IBM Z container |

Threat actors can use exfiltration techniques that enable them to intercept networks which can result in data loss or leakage. Ingress and egress filtering keeps suspicious traffic out of the network. In order to create a Network policy for your CICS Transaction Gateway container, follow these instructions: Restricting network traffic for CICS Transaction Gateway containers

CICS Transaction Gateway for Multiplatforms | 9.3.0.0| Linux on Intel container

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmcics_transaction_gatewayMatch9.3
CPENameOperatorVersion
cics transaction gatewayeq9.3

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

6.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.5%

Related for CA480D0E529A5FECA44A05ACA96C924A4DAA4D9FB2C0EC4CE0352573999CF1B8