There is a vulnerability in the Eclipse Paho library used by IBM WebSphere Application Server Liberty with the rtcomm-1.0 or rtcommGateway-1.0 feature enabled. This has been addressed.
CVEID:CVE-2019-11777
**DESCRIPTION:**Eclipse Paho Java client could allow a remote attacker to bypass security restrictions, caused by the failure to check the result when connecting to an MQTT server using TLS and setting a host name verifier. By sending a specially-crafted request, an attacker could exploit this vulnerability to allow one MQTT server to impersonate another and provide the client library with incorrect information.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/167068 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM WebSphere Application Server Liberty | 17.0.0.3 - 22.0.0.7 |
IBM strongly recommends addressing the vulnerability now by applying a currently available interim fix or fix pack that contains the APAR PH45750. To determine if a feature is enabled for IBM WebSphere Application Server Liberty, refer to How to determine if Liberty is using a specific feature.
For IBM WebSphere Application Server Liberty 17.0.0.3 - 22.0.0.7 using the rtcomm-1.0 or rtcommGateway-1.0 feature(s):
ยท Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PH45750
--ORโ
ยท Apply Liberty Fix Pack 22.0.0.8 or later (targeted availability 3Q2022).
Additional interim fixes may be available and linked off the interim fix download page.
None
CPE | Name | Operator | Version |
---|---|---|---|
websphere application server | eq | any |