First published: Tue Jun 06 2023(Updated: )
IBM CICS TX Advanced could transmit highly sensitive information in query parameters that could be intercepted using man in the middle techniques.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM TXSeries for Multiplatforms | <=8.1 | |
IBM TXSeries for Multiplatforms | <=8.2 | |
IBM TXSeries for Multiplatforms | <=9.1 | |
IBM CICS TX | =10.1 | |
IBM CICS TX | =11.1 | |
IBM CICS TX | =11.1 | |
Linux Linux kernel | ||
IBM TXSeries for Multiplatforms | =8.1 | |
IBM TXSeries for Multiplatforms | =9.1 | |
IBM AIX | ||
IBM TXSeries for Multiplatforms | =8.2 | |
HP HP-UX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-33849.
IBM TXSeries for Multiplatforms 8.1, 8.2, 9.1, CICS TX Standard 11.1, CICS TX Advanced 10.1 and 11.1 are affected by this vulnerability.
The severity of this vulnerability is low, with a CVSS score of 3.7.
The vulnerability can be exploited by intercepting sensitive information in query parameters using man-in-the-middle techniques.
You can fix this vulnerability by applying the patches provided by IBM for the affected versions of IBM TXSeries for Multiplatforms. Please refer to the IBM support pages for more information.