First published: Thu Mar 09 2023(Updated: )
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment. IBM X-Force ID: 247621.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Guardium Key Lifecycle Manager | <=3.0 | |
IBM Security Guardium Key Lifecycle Manager | <=3.0.1 | |
IBM Security Guardium Key Lifecycle Manager | <=4.0 | |
IBM Security Guardium Key Lifecycle Manager | <=4.1 | |
IBM Security Guardium Key Lifecycle Manager | <=4.1.1 | |
All of | ||
IBM Security Guardium Key Lifecycle Manager | >=3.0.0<4.1.1.7 | |
Any of | ||
IBM AIX | ||
Linux Kernel | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25922 is considered a high severity vulnerability due to the ability for attackers to upload or transfer dangerous file types.
To fix CVE-2023-25922, apply the available patches provided by IBM for the affected versions of the Security Guardium Key Lifecycle Manager.
Versions 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 of IBM Security Guardium Key Lifecycle Manager are affected by CVE-2023-25922.
CVE-2023-25922 allows attackers to upload files of dangerous types that may be processed in the product's environment, potentially leading to further exploitation.
As of now, specific details about publicly known exploits for CVE-2023-25922 have not been disclosed.