First published: Wed Feb 08 2023(Updated: )
IBM Sterling B2B Integrator Standard Edition could allow an authenticated user to perform actions they should not have access to due to improper permission controls.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling B2B Integrator | <=6.1.0.0 - 6.1.1.1, 6.1.2.0 | |
IBM Sterling B2B Integrator | >=6.1.0.0<=6.1.1.1 | |
IBM Sterling B2B Integrator | =6.1.2.0 | |
IBM AIX | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-40232 is rated as high.
The affected software for CVE-2022-40232 is IBM Sterling B2B Integrator Standard Edition version 6.1.0.0 through 6.1.1.1, and 6.1.2.0.
An authenticated user can exploit CVE-2022-40232 by performing actions they should not have access to due to improper permission controls.
No, IBM Sterling B2B Integrator is not the only affected software for CVE-2022-40232. IBM AIX, Linux kernel, and Microsoft Windows are not vulnerable to this specific vulnerability.
You can find more information about CVE-2022-40232 on the IBM X-Force ID page and the IBM support page.