Refine your search
6 vulnerabilities found for MaaS360 by IBM
CERTFR-2025-AVI-0154
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP11 IF01 | ||
IBM | Controller | Controller versions 11.1.0.x antérieures à 11.1.0.1 | ||
IBM | MaaS360 | MaaS360 Base, Configuration Utility versions antérieures à 3.001.100 | ||
IBM | MaaS360 | MaaS360 Mobile Enterprise Gateway versions antérieures à 3.001.100 | ||
IBM | Cognos Controller | Cognos Controller versions 11.x antérieures à 11.0.1 FP4 |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP11 IF01", "product": { "name": "QRadar SIEM", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Controller versions 11.1.0.x ant\u00e9rieures \u00e0 11.1.0.1", "product": { "name": "Controller", "vendor": { "name": "IBM", "scada": false } } }, { "description": "MaaS360 Base, Configuration Utility versions ant\u00e9rieures \u00e0 3.001.100", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "MaaS360 Mobile Enterprise Gateway versions ant\u00e9rieures \u00e0 3.001.100", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Cognos Controller versions 11.x ant\u00e9rieures \u00e0 11.0.1 FP4", "product": { "name": "Cognos Controller", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-21235", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21235" }, { "name": "CVE-2024-21144", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21144" }, { "name": "CVE-2023-39017", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39017" }, { "name": "CVE-2024-45084", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45084" }, { "name": "CVE-2024-45081", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45081" }, { "name": "CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "name": "CVE-2021-36373", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36373" }, { "name": "CVE-2015-2325", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2325" }, { "name": "CVE-2024-28780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28780" }, { "name": "CVE-2024-56326", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56326" }, { "name": "CVE-2024-8508", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8508" }, { "name": "CVE-2024-10917", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10917" }, { "name": "CVE-2021-36374", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36374" }, { "name": "CVE-2024-12085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12085" }, { "name": "CVE-2024-52902", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52902" }, { "name": "CVE-2024-1488", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1488" }, { "name": "CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "name": "CVE-2023-47160", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47160" }, { "name": "CVE-2024-28776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28776" }, { "name": "CVE-2024-21907", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21907" }, { "name": "CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "name": "CVE-2024-38999", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38999" }, { "name": "CVE-2024-9823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9823" }, { "name": "CVE-2024-40642", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40642" }, { "name": "CVE-2024-21145", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21145" }, { "name": "CVE-2022-4245", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4245" }, { "name": "CVE-2022-4244", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4244" }, { "name": "CVE-2023-50314", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50314" }, { "name": "CVE-2024-52337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52337" }, { "name": "CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" }, { "name": "CVE-2024-21131", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21131" }, { "name": "CVE-2024-21210", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21210" }, { "name": "CVE-2020-11979", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11979" }, { "name": "CVE-2024-21217", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21217" }, { "name": "CVE-2024-27267", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27267" }, { "name": "CVE-2018-12699", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12699" }, { "name": "CVE-2024-28777", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28777" }, { "name": "CVE-2024-21208", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21208" } ], "initial_release_date": "2025-02-21T00:00:00", "last_revision_date": "2025-02-21T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0154", "revisions": [ { "description": "Version initiale", "revision_date": "2025-02-21T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": "2025-02-18", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7183597", "url": "https://www.ibm.com/support/pages/node/7183597" }, { "published_at": "2025-02-18", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7183584", "url": "https://www.ibm.com/support/pages/node/7183584" }, { "published_at": "2025-02-18", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7183612", "url": "https://www.ibm.com/support/pages/node/7183612" } ] }
CERTFR-2024-AVI-0614
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits IBM. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "MaaS360 VPN versions ant\u00e9rieures \u00e0 3.000.850", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-4741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741" } ], "initial_release_date": "2024-07-19T00:00:00", "last_revision_date": "2024-07-19T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0614", "revisions": [ { "description": "Version initiale", "revision_date": "2024-07-19T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits IBM. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.", "title": "Vuln\u00e9rabilit\u00e9 dans IBM MaaS360", "vendor_advisories": [ { "published_at": "2024-07-17", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7160455", "url": "https://www.ibm.com/support/pages/node/7160455" } ] }
CERTFR-2024-AVI-0113
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
IBM | Sterling | Sterling File Gateway version 6.1.x antérieures à 6.1.2.4 | ||
IBM | Sterling | Sterling B2B Integrator version 6.0.x antérieures à 6.0.3.9 | ||
IBM | MaaS360 | MaaS360 Cloud Extender Agent versions antérieures à 3.000.300.025 | ||
IBM | MaaS360 | MaaS360 Mobile Enterprise Gateway versions antérieures à 3.000.400 | ||
IBM | Sterling | Sterling File Gateway version 6.0.x antérieures à 6.0.3.9 | ||
IBM | QRadar | QRadar Pulse App versions antérieures à 2.2.12 | ||
IBM | Sterling | Sterling B2B Integrator version 6.1.x antérieures à 6.1.2.4 | ||
IBM | MaaS360 | MaaS360 VPN versions antérieures à 3.000.400 | ||
IBM | Sterling | Sterling Transformation Extender versions 10.1.0, 10.1.1, 10.1.2 et 11.0.0 sans le correctif de sécurité APAR PH58718 | ||
IBM | Sterling Control Center | Sterling Control Center versions antérieures à 6.3.0.0 iFix04 |
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Sterling File Gateway version 6.1.x ant\u00e9rieures \u00e0 6.1.2.4", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Sterling B2B Integrator version 6.0.x ant\u00e9rieures \u00e0 6.0.3.9", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "MaaS360 Cloud Extender Agent versions ant\u00e9rieures \u00e0 3.000.300.025", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "MaaS360 Mobile Enterprise Gateway versions ant\u00e9rieures \u00e0 3.000.400", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Sterling File Gateway version 6.0.x ant\u00e9rieures \u00e0 6.0.3.9", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "QRadar Pulse App versions ant\u00e9rieures \u00e0 2.2.12", "product": { "name": "QRadar", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Sterling B2B Integrator version 6.1.x ant\u00e9rieures \u00e0 6.1.2.4", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "MaaS360 VPN versions ant\u00e9rieures \u00e0 3.000.400", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Sterling Transformation Extender versions 10.1.0, 10.1.1, 10.1.2 et 11.0.0 sans le correctif de s\u00e9curit\u00e9 APAR PH58718", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Sterling Control Center versions ant\u00e9rieures \u00e0 6.3.0.0 iFix04", "product": { "name": "Sterling Control Center", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-46308", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46308" }, { "name": "CVE-2010-3300", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3300" }, { "name": "CVE-2022-25883", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25883" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2023-34462", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34462" }, { "name": "CVE-2023-34454", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34454" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2023-5363", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363" }, { "name": "CVE-2023-32559", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32559" }, { "name": "CVE-2023-22081", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22081" }, { "name": "CVE-2023-34453", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34453" }, { "name": "CVE-2023-22067", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22067" }, { "name": "CVE-2022-40609", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40609" }, { "name": "CVE-2023-34455", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34455" }, { "name": "CVE-2023-46849", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46849" }, { "name": "CVE-2023-36478", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36478" }, { "name": "CVE-2023-34396", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34396" }, { "name": "CVE-2023-40167", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40167" }, { "name": "CVE-2023-41900", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41900" }, { "name": "CVE-2023-36479", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36479" }, { "name": "CVE-2023-5676", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5676" }, { "name": "CVE-2023-20883", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20883" }, { "name": "CVE-2023-32006", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32006" }, { "name": "CVE-2023-32002", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32002" }, { "name": "CVE-2023-34149", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34149" }, { "name": "CVE-2016-1000027", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027" }, { "name": "CVE-2023-46850", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46850" } ], "initial_release_date": "2024-02-09T00:00:00", "last_revision_date": "2024-02-09T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0113", "revisions": [ { "description": "Version initiale", "revision_date": "2024-02-09T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7116082 du 07 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7116082" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7115287 du 06 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7115287" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7114777 du 05 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7114777" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7116078 du 07 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7116078" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7116073 du 07 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7116073" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7116050 du 07 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7116050" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7116376 du 09 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7116376" } ] }
CERTFR-2023-AVI-0798
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
IBM | MaaS360 | Module VPN MaaS360 versions antérieures à 3.000.200 | ||
IBM | QRadar | QRadar Data Synchronization App versions 1.0.x à 3.1.1 antérieures à 3.1.2 | ||
IBM | Tivoli | Tivoli Netcool Impact versions 7.1.x antérieures à 7.1.0.31 | ||
IBM | MaaS360 | MaaS360 Mobile Enterprise Gateway versions antérieures à 3.000.200 |
Title | Publication Time | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Module VPN MaaS360 versions ant\u00e9rieures \u00e0 3.000.200", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "QRadar Data Synchronization App versions 1.0.x \u00e0 3.1.1 ant\u00e9rieures \u00e0 3.1.2", "product": { "name": "QRadar", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Tivoli Netcool Impact versions 7.1.x ant\u00e9rieures \u00e0 7.1.0.31", "product": { "name": "Tivoli", "vendor": { "name": "IBM", "scada": false } } }, { "description": "MaaS360 Mobile Enterprise Gateway versions ant\u00e9rieures \u00e0 3.000.200", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-28867", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28867" }, { "name": "CVE-2022-46175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175" }, { "name": "CVE-2023-26049", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26049" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2023-20863", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20863" }, { "name": "CVE-2022-25881", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25881" }, { "name": "CVE-2023-24998", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24998" }, { "name": "CVE-2023-26048", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26048" } ], "initial_release_date": "2023-10-03T00:00:00", "last_revision_date": "2023-10-03T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0798", "revisions": [ { "description": "Version initiale", "revision_date": "2023-10-03T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7043471 du 02 octobre 2023", "url": "https://www.ibm.com/support/pages/node/7043471" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7042785 du 29 septembre 2023", "url": "https://www.ibm.com/support/pages/node/7042785" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7043103 du 29 septembre 2023", "url": "https://www.ibm.com/support/pages/node/7043103" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7040883 du 29 septembre 2023", "url": "https://www.ibm.com/support/pages/node/7040883" } ] }
CERTFR-2023-AVI-0444
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
IBM | Sterling | IBM Sterling Partner Engagement Manager Essentials Edition versions 6.2.2.x antérieures à 6.2.2.1 | ||
IBM | MaaS360 | IBM MaaS360 Cloud Extender Base Module versions antérieures à 3.000.100.069 | ||
IBM | Sterling | IBM Sterling Partner Engagement Manager Essentials Edition versions 6.2.0.x antérieures à 6.2.0.6 | ||
IBM | MaaS360 | IBM MaaS360 PKI Certificate Module versions antérieures à 3.000.100 | ||
IBM | Sterling | IBM Sterling Partner Engagement Manager Standard Edition versions 6.2.1.x antérieures à 6.2.1.3 | ||
IBM | Sterling | IBM Sterling Partner Engagement Manager Standard Edition versions 6.1.2.x antérieures à 6.1.2.8 | ||
IBM | Sterling | IBM Sterling Partner Engagement Manager Standard Edition versions 6.2.0.x antérieures à 6.2.0.6 | ||
IBM | MaaS360 | IBM MaaS360 VPN versions antérieures à 3.000.100 | ||
IBM | Sterling | IBM Sterling Partner Engagement Manager Essentials Edition versions 6.1.2.x antérieures à 6.1.2.8 | ||
IBM | QRadar User Behavior Analytics | IBM QRadar User Behavior Analytics versions 1.x à 4.1.x antérieures à 4.1.12 | ||
IBM | MaaS360 | IBM MaaS360 Configuration Utility versions antérieures à 3.000.100 | ||
IBM | QRadar Deployment Intelligence App | IBM QRadar Deployment Intelligence App versions 2.x à 3.0.x antérieures à 3.0.10 | ||
IBM | MaaS360 | IBM MaaS360 Mobile Enterprise Gateway versions antérieures à 3.000.100 | ||
IBM | Sterling | IBM Sterling Partner Engagement Manager Standard Edition versions 6.2.2.x antérieures à 6.2.2.1 | ||
IBM | MaaS360 | IBM MaaS360 Cloud Extender Agent versions antérieures à 3.000.100.069 | ||
IBM | Sterling | IBM Sterling Partner Engagement Manager Essentials Edition versions 6.2.1.x antérieures à 6.2.1.3 |
Title | Publication Time | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "IBM Sterling Partner Engagement Manager Essentials Edition versions 6.2.2.x ant\u00e9rieures \u00e0 6.2.2.1", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM MaaS360 Cloud Extender Base Module versions ant\u00e9rieures \u00e0 3.000.100.069", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Partner Engagement Manager Essentials Edition versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.6", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM MaaS360 PKI Certificate Module versions ant\u00e9rieures \u00e0 3.000.100", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Partner Engagement Manager Standard Edition versions 6.2.1.x ant\u00e9rieures \u00e0 6.2.1.3", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Partner Engagement Manager Standard Edition versions 6.1.2.x ant\u00e9rieures \u00e0 6.1.2.8", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Partner Engagement Manager Standard Edition versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.6", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM MaaS360 VPN versions ant\u00e9rieures \u00e0 3.000.100", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Partner Engagement Manager Essentials Edition versions 6.1.2.x ant\u00e9rieures \u00e0 6.1.2.8", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM QRadar User Behavior Analytics versions 1.x \u00e0 4.1.x ant\u00e9rieures \u00e0 4.1.12", "product": { "name": "QRadar User Behavior Analytics", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM MaaS360 Configuration Utility versions ant\u00e9rieures \u00e0 3.000.100", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM QRadar Deployment Intelligence App versions 2.x \u00e0 3.0.x ant\u00e9rieures \u00e0 3.0.10", "product": { "name": "QRadar Deployment Intelligence App", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM MaaS360 Mobile Enterprise Gateway versions ant\u00e9rieures \u00e0 3.000.100", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Partner Engagement Manager Standard Edition versions 6.2.2.x ant\u00e9rieures \u00e0 6.2.2.1", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM MaaS360 Cloud Extender Agent versions ant\u00e9rieures \u00e0 3.000.100.069", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Partner Engagement Manager Essentials Edition versions 6.2.1.x ant\u00e9rieures \u00e0 6.2.1.3", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-0216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216" }, { "name": "CVE-2023-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401" }, { "name": "CVE-2022-46175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175" }, { "name": "CVE-2022-4304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304" }, { "name": "CVE-2023-27555", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27555" }, { "name": "CVE-2021-23440", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23440" }, { "name": "CVE-2022-31160", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31160" }, { "name": "CVE-2023-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2022-4203", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4203" }, { "name": "CVE-2023-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217" }, { "name": "CVE-2023-29257", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29257" }, { "name": "CVE-2023-26021", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26021" }, { "name": "CVE-2022-3509", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3509" }, { "name": "CVE-2021-37533", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37533" }, { "name": "CVE-2023-27535", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27535" }, { "name": "CVE-2022-40152", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40152" }, { "name": "CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "name": "CVE-2017-7525", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7525" }, { "name": "CVE-2022-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450" }, { "name": "CVE-2022-41915", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41915" }, { "name": "CVE-2023-27534", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27534" }, { "name": "CVE-2023-27536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27536" }, { "name": "CVE-2022-42004", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004" }, { "name": "CVE-2023-27533", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27533" }, { "name": "CVE-2022-25881", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25881" }, { "name": "CVE-2023-27538", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27538" }, { "name": "CVE-2023-25930", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25930" }, { "name": "CVE-2022-41854", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41854" }, { "name": "CVE-2023-29255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29255" }, { "name": "CVE-2022-38752", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38752" }, { "name": "CVE-2023-24998", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24998" }, { "name": "CVE-2023-27559", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27559" }, { "name": "CVE-2022-42003", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003" }, { "name": "CVE-2022-1471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1471" }, { "name": "CVE-2023-26022", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26022" }, { "name": "CVE-2022-3171", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3171" }, { "name": "CVE-2023-27537", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27537" }, { "name": "CVE-2022-41881", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41881" }, { "name": "CVE-2022-25168", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25168" }, { "name": "CVE-2023-23916", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23916" } ], "initial_release_date": "2023-06-08T00:00:00", "last_revision_date": "2023-06-08T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0444", "revisions": [ { "description": "Version initiale", "revision_date": "2023-06-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une ex\u00e9cution de\ncode arbitraire \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7001723 du 06 juin 2023", "url": "https://www.ibm.com/support/pages/node/7001723" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7001639 du 06 juin 2023", "url": "https://www.ibm.com/support/pages/node/7001639" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7001571 du 06 juin 2023", "url": "https://www.ibm.com/support/pages/node/7001571" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7001689 du 06 juin 2023", "url": "https://www.ibm.com/support/pages/node/7001689" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7001643 du 06 juin 2023", "url": "https://www.ibm.com/support/pages/node/7001643" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7001815 du 07 juin 2023", "url": "https://www.ibm.com/support/pages/node/7001815" } ] }
CERTFR-2022-AVI-523
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
IBM | QRadar SIEM | IBM QRadar SIEM versions antérieures à 7.5 sans le correctif de sécurité 7.5.0-QRADAR-PROTOCOL-BlueCoatWSSRESTAPI-7.5-20220217192923 | ||
IBM | MaaS360 | IBM MaaS360 Cloud Extender Agent versions antérieures à 2.106.500.011 | ||
IBM | MaaS360 | IBM MaaS360 VPN Module versions antérieures à 2.106.500 | ||
IBM | QRadar SIEM | IBM QRadar SIEM versions antérieures à 7.3 sans le correctif de sécurité 7.3.0-QRADAR-PROTOCOL-BlueCoatWSSRESTAPI-7.3-20220214173614 | ||
IBM | MaaS360 | IBM MaaS360 Mobile Enterprise Gateway versions antérieures à 2.106.500 | ||
IBM | QRadar SIEM | IBM QRadar SIEM versions antérieures à 7.4 sans le correctif de sécurité 7.4.0-QRADAR-PROTOCOL-BlueCoatWSSRESTAPI-7.4-20220217192850 |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "IBM QRadar SIEM versions ant\u00e9rieures \u00e0 7.5 sans le correctif de s\u00e9curit\u00e9 7.5.0-QRADAR-PROTOCOL-BlueCoatWSSRESTAPI-7.5-20220217192923", "product": { "name": "QRadar SIEM", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM MaaS360 Cloud Extender Agent versions ant\u00e9rieures \u00e0 2.106.500.011", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM MaaS360 VPN Module versions ant\u00e9rieures \u00e0 2.106.500", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM QRadar SIEM versions ant\u00e9rieures \u00e0 7.3 sans le correctif de s\u00e9curit\u00e9 7.3.0-QRADAR-PROTOCOL-BlueCoatWSSRESTAPI-7.3-20220214173614", "product": { "name": "QRadar SIEM", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM MaaS360 Mobile Enterprise Gateway versions ant\u00e9rieures \u00e0 2.106.500", "product": { "name": "MaaS360", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM QRadar SIEM versions ant\u00e9rieures \u00e0 7.4 sans le correctif de s\u00e9curit\u00e9 7.4.0-QRADAR-PROTOCOL-BlueCoatWSSRESTAPI-7.4-20220217192850", "product": { "name": "QRadar SIEM", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": "", "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-22950", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22950" }, { "name": "CVE-2022-22965", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22965" }, { "name": "CVE-2021-28169", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28169" }, { "name": "CVE-2021-35516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35516" }, { "name": "CVE-2021-35517", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35517" }, { "name": "CVE-2021-28163", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28163" }, { "name": "CVE-2021-28165", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28165" }, { "name": "CVE-2021-36090", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36090" }, { "name": "CVE-2021-22060", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22060" }, { "name": "CVE-2022-0547", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0547" }, { "name": "CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "name": "CVE-2021-34429", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34429" }, { "name": "CVE-2021-28164", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28164" }, { "name": "CVE-2021-35515", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35515" }, { "name": "CVE-2021-34428", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34428" } ], "initial_release_date": "2022-06-07T00:00:00", "last_revision_date": "2022-06-07T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-523", "revisions": [ { "description": "Version initiale", "revision_date": "2022-06-07T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": "2022-06-06", "title": "Bulletin de s\u00e9curit\u00e9 IBM 6592779", "url": "https://www.ibm.com/support/pages/node/6592779" }, { "published_at": "2022-06-06", "title": "Bulletin de s\u00e9curit\u00e9 IBM 6592807", "url": "https://www.ibm.com/support/pages/node/6592807" }, { "published_at": "2022-06-06", "title": "Bulletin de s\u00e9curit\u00e9 IBM 6592799", "url": "https://www.ibm.com/support/pages/node/6592799" } ] }