6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
48.5%
Eclipse Openj9 is used by CICS Transaction Gateway Desktop Edition. The fix removes vulnerability CVE-2022-3676 that could allow a remote attacker to bypass security restrictions.
CVEID:CVE-2022-3676
**DESCRIPTION:**Eclipse Openj9 could allow a remote attacker to bypass security restrictions, caused by improper runtime type check by the interface calls. By sending a specially-crafted request using bytecode, an attacker could exploit this vulnerability to access or modify memory.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/239608 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
Affected Product(s) | Version(s) |
---|---|
CICS Transaction Gateway Desktop Edition | All |
IBM recommends you apply these fixes.
Product
| VRMF|APAR|Remediation / First Fix
—|—|—|—
CICS Transaction Gateway Desktop Edition| 9.2| Updated JRE’s have been made available on Fix Central as Fix packs.|
AIX: Fix Central Link
pLinux: Fix Central Link
xLinux: Fix Central Link
zLinux: Fix Central Link
Windows: Fix Central Link
CICS Transaction Gateway Desktop Edition| 9.1| Updated JRE’s have been made available on Fix Central as Fix packs.|
AIX: Fix Central Link
pLinux: Fix Central Link
xLinux: Fix Central Link
zLinux: Fix Central Link
Windows: Fix Central Link
CICS Transaction Gateway Desktop Edition|
9.0
| Updated JRE’s have been made available on Fix Central as Fix packs.|
AIX: Fix Central Link
pLinux: Fix Central Link
xLinux: Fix Central Link
zLinux: Fix Central Link
Windows: Fix Central Link
Solaris: Fix Central Link
None
CPE | Name | Operator | Version |
---|---|---|---|
cics transaction gateway | eq | 9.0.0 | |
cics transaction gateway | eq | 9.1.0 | |
cics transaction gateway | eq | 9.2.0 |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
48.5%