First published: Sat Jul 15 2023(Updated: )
IBM Robotic Process Automation 21.0.0 through 21.0.7.6 and 23.0.0 through 23.0.6 is vulnerable to client side validation bypass which could allow invalid changes or values in some fields. IBM X-Force ID: 259380.
Credit: psirt@us.ibm.com psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Robotic Process Automation | <=21.0.0 - 21.0.7.6, 23.0.0 - 23.0.6 | |
IBM Robotic Process Automation for Cloud Pak | <=21.0.0 - 21.0.7.6, 23.0.0 - 23.0.6 | |
IBM Robotic Process Automation as a Service | <=21.0.0 - 21.0.7.6, 23.0.0 - 23.0.6 | |
IBM Robotic Process Automation | >=21.0.0<=21.0.7.6 | |
IBM Robotic Process Automation | >=23.0.0<=23.0.6 | |
IBM Robotic Process Automation as a Service | >=21.0.0<=21.0.7.6 | |
IBM Robotic Process Automation for Cloud Pak | >=21.0.0<=21.0.7.6 | |
IBM Robotic Process Automation for Cloud Pak | >=23.0.0<=23.0.6 | |
Redhat Openshift | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-35901 is medium with a severity value of 5.3.
The affected software for CVE-2023-35901 is IBM Robotic Process Automation versions 21.0.0 - 21.0.7.6 and 23.0.0 - 23.0.6.
The client side validation bypass vulnerability in IBM Robotic Process Automation allows for invalid changes or values in some fields.
To fix the client side validation bypass vulnerability in IBM Robotic Process Automation, update to a version beyond 23.0.6 or apply the necessary patches provided by IBM.
You can find more information about CVE-2023-35901 on the IBM X-Force Exchange website and the IBM support pages.