6.6 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
8.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:C/I:C/A:C
0.96 High
EPSS
Percentile
99.3%
Websphere Application Server (WAS) is shipped as a component of IBM Operations Analytics Predictive Insights. The WebSphere Application Server is vulnerable to a remote code execution (RCE) attack (CVE-2021-44832 ) where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI when using Apache Log4j2 versions 2.0-beta7 through 2.17.0. A second vulnerability with Apache Log4j2 versions 2.0-beta7 through 2.16.0 can be exploited to cause uncontrolled recursion and Denial of Service (CVE-2021-45105). Information has been published in an IBM WebSphere Application Server issued Security Bulletin.
Refer to the security bulletin(s) listed in the Remediation/Fixes section
Principal Product and Version(s) | Affected Supporting Product and Version(s) |
---|---|
IBM Operations Analytics Predictive Insights - 1.3.3 | Websphere Application Server traditional 8.5 & 9.0 |
IBM Operations Analytics Predictive Insights - 1.3.5 | Websphere Application Server traditional 8.5 & 9.0 |
IBM Operations Analytics Predictive Insights - 1.3.6 | Websphere Application Server traditional 8.5 & 9.0 |
For more information and recommended solution see the full details disclosed in the security bulleti
IBM strongly recommends to address this vulnerability by applying the solution disclosed in the security bulletin: Multiple vulnerabilities in Apache log4j affect IBM WebSphere Application Server (CVE-2021-45105, CVE-2021-44832)
None
6.6 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
8.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:C/I:C/A:C
0.96 High
EPSS
Percentile
99.3%