First published: Wed Aug 16 2023(Updated: )
IBM Security Guardium 10.6, 11.3, 11.4, and 11.5 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 258824.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium z/OS | <=10.6 | |
IBM InfoSphere Guardium z/OS | <=11.3 | |
IBM InfoSphere Guardium z/OS | <=11.4 | |
IBM InfoSphere Guardium z/OS | <=11.5 | |
IBM InfoSphere Guardium z/OS | =10.6 | |
IBM InfoSphere Guardium z/OS | =11.3 | |
IBM InfoSphere Guardium z/OS | =11.4 | |
IBM InfoSphere Guardium z/OS | =11.5 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-35893.
The severity of CVE-2023-35893 is critical with a CVSS score of 9.9.
IBM Security Guardium versions 10.6, 11.3, 11.4, and 11.5 are affected by CVE-2023-35893.
A remote authenticated attacker can exploit CVE-2023-35893 by sending a specially crafted request to execute arbitrary commands on the system.
Yes, IBM has released a fix for CVE-2023-35893. Please refer to the IBM Security Guardium support page for more information.