First published: Mon Jun 05 2023(Updated: )
IBM Sterling Partner Engagement Manager 6.1, 6.2, and 6.2.1 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 245891.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Partner Engagement Manager | >=6.1.2<6.1.2.8 | |
IBM Sterling Partner Engagement Manager | >=6.1.2<6.1.2.8 | |
IBM Sterling Partner Engagement Manager | >=6.2.0<6.2.0.6 | |
IBM Sterling Partner Engagement Manager | >=6.2.0<6.2.0.6 | |
IBM Sterling Partner Engagement Manager | >=6.2.1<6.2.1.3 | |
IBM Sterling Partner Engagement Manager | >=6.2.1<6.2.1.3 | |
Linux Linux kernel | ||
IBM Sterling Partner Engagement Manager Essentials and Standard Editions | <=6.2.1 | |
IBM Sterling Partner Engagement Manager Essentials and Standard Editions | <=6.1.2 | |
IBM Sterling Partner Engagement Manager Essentials and Standard Editions | <=6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-23482.
The severity level of CVE-2023-23482 is critical.
Version 6.1, 6.2, and 6.2.1 of IBM Sterling Partner Engagement Manager are affected by CVE-2023-23482.
A remote attacker can exploit CVE-2023-23482 by persuading a victim to visit a malicious website, allowing the attacker to hijack the victim's click actions.
Yes, you can find the patch for CVE-2023-23482 on the IBM website.