First published: Sun Nov 08 2015(Updated: )
The GatewayScript modules on IBM DataPower Gateways with software 7.2.0.x before 7.2.0.1, when the GatewayScript decryption API or a JWE decrypt action is enabled, do not require signed ciphertext data, which makes it easier for remote attackers to obtain plaintext data via a padding-oracle attack.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM DataPower Gateway 10.5.0 | <=7.2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7412 has a moderate severity level as it allows for remote plaintext data exposure through padding-oracle attacks.
To fix CVE-2015-7412, update IBM DataPower Gateway software to version 7.2.0.1 or later.
CVE-2015-7412 affects IBM DataPower Gateways with software versions up to 7.2.0.0.
CVE-2015-7412 can be exploited by remote attackers through a padding-oracle attack due to insufficient validation of signed ciphertext.
There is no specific workaround for CVE-2015-7412; upgrading to the patched version is recommended to mitigate the risk.