First published: Mon Jan 09 2023(Updated: )
IBM Robotic Process Automation 20.12.0 through 21.0.2 defaults to HTTP in some RPA commands when the prefix is not explicitly specified in the URL. This could allow an attacker to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 244109.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Robotic Process Automation | <=< 21.0.3 | |
IBM Robotic Process Automation for Cloud Pak | <=< 21.0.3 | |
IBM Robotic Process Automation as a Service | <=< 21.0.3 | |
IBM Robotic Process Automation | <21.0.3 | |
IBM Robotic Process Automation as a Service | <21.0.3 | |
IBM Robotic Process Automation for Cloud Pak | <21.0.3 | |
Microsoft Windows | ||
Redhat Openshift |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this IBM Robotic Process Automation vulnerability is CVE-2023-22863.
The severity of CVE-2023-22863 is medium.
This vulnerability affects IBM Robotic Process Automation versions up to 21.0.3.
The impact of this vulnerability is that it allows an attacker to obtain sensitive information using man-in-the-middle techniques.
To fix CVE-2023-22863, ensure that the URL in RPA commands explicitly specifies the HTTPS prefix.