First published: Tue Jun 06 2023(Updated: )
IBM CICS TX Advanced could transmit highly sensitive information in query parameters that could be intercepted using man in the middle techniques.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM CICS Transaction Server for z/OS | <=11.1 | |
IBM CICS Transaction Server for z/OS | =10.1 | |
IBM CICS Transaction Server for z/OS | =11.1 | |
IBM CICS Transaction Server for z/OS | =11.1 | |
Linux kernel | ||
IBM TXSeries for Multiplatform | =8.1 | |
IBM TXSeries for Multiplatform | =9.1 | |
IBM AIX | ||
IBM TXSeries for Multiplatform | =8.2 | |
HPE HP-UX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-33849.
IBM TXSeries for Multiplatforms 8.1, 8.2, 9.1, CICS TX Standard 11.1, CICS TX Advanced 10.1 and 11.1 are affected by this vulnerability.
The severity of this vulnerability is low, with a CVSS score of 3.7.
The vulnerability can be exploited by intercepting sensitive information in query parameters using man-in-the-middle techniques.
You can fix this vulnerability by applying the patches provided by IBM for the affected versions of IBM TXSeries for Multiplatforms. Please refer to the IBM support pages for more information.