First published: Fri Oct 28 2022(Updated: )
IBM CICS TX Standard and Advanced 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 229441.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM CICS TX Advanced | <=11.1 | |
All of | ||
Any of | ||
IBM CICS TX | <11.1.0.0 | |
IBM CICS TX | =11.1.0.0 | |
IBM CICS TX | =11.1.0.0 | |
IBM CICS TX | =11.1.0.0-interim_fix_1 | |
IBM CICS TX | =11.1.0.0-interim_fix_1 | |
IBM CICS TX | =11.1.0.0-interim_fix_2 | |
IBM CICS TX | =11.1.0.0-interim_fix_2 | |
IBM CICS TX | =11.1.0.0-interim_fix_3 | |
IBM CICS TX | =11.1.0.0-interim_fix_3 | |
IBM CICS TX | =11.1.0.0-interim_fix_4 | |
IBM CICS TX | =11.1.0.0-interim_fix_4 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34310 has been categorized as a medium severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2022-34310, apply the recommended patch available from IBM for CICS TX Advanced and Standard versions.
CVE-2022-34310 affects IBM CICS TX Standard and Advanced versions up to and including 11.1, as well as specific interim fix versions.
The risk associated with CVE-2022-34310 is that attackers could exploit weaker cryptographic algorithms to decrypt sensitive information.
Yes, there are multiple interim fixes available for CVE-2022-34310, which should be applied to the affected software.