First published: Thu Mar 09 2023(Updated: )
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment. IBM X-Force ID: 247620.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Security Key Lifecycle Manager | <=3.0 | |
Ibm Security Key Lifecycle Manager | <=3.0.1 | |
IBM Security Guardium Key Lifecycle Manager | <=4.0 | |
IBM Security Guardium Key Lifecycle Manager | <=4.1 | |
IBM Security Guardium Key Lifecycle Manager | <=4.1.1 | |
All of | ||
IBM Security Guardium Key Lifecycle Manager | >=3.0.0<4.1.1.7 | |
Any of | ||
IBM AIX | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25921 has been rated as a high-severity vulnerability due to the potential for file uploads of dangerous types.
To fix CVE-2023-25921, apply the patch available for IBM Security Guardium Key Lifecycle Manager version up to 4.1.1.6.
CVE-2023-25921 affects IBM Security Guardium Key Lifecycle Manager versions 3.0 to 4.1.1.1.
CVE-2023-25921 can be exploited by allowing attackers to upload or transfer files of dangerous types for automated processing.
Currently, there are no documented workarounds for CVE-2023-25921, so it is essential to apply the patch as soon as possible.