First published: Mon Apr 06 2020(Updated: )
IBM QRadar 7.3.0 to 7.3.3 Patch 2 is vulnerable to Server Side Request Forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-ForceID: 176404.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Security Information and Event Manager | >=7.3.0<7.3.3 | |
IBM QRadar Security Information and Event Manager | =7.3.3 | |
IBM QRadar Security Information and Event Manager | =7.3.3-p1 | |
IBM QRadar Security Information and Event Manager | =7.3.3-p2 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4294 has a moderate severity level, as it allows authenticated attackers to potentially exploit the system via Server Side Request Forgery.
To fix CVE-2020-4294, upgrade IBM QRadar Security Information and Event Manager to version 7.3.3 Patch 3 or later.
In the context of CVE-2020-4294, Server Side Request Forgery allows an attacker to send unauthorized requests from the vulnerable system, which can lead to further exploitation.
IBM QRadar versions 7.3.0 to 7.3.3 Patch 2 are affected by CVE-2020-4294.
Yes, CVE-2020-4294 may facilitate network enumeration and potentially lead to various other attacks when exploited.