First published: Sun Oct 22 2023(Updated: )
IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0, and 6.2.2 could allow a remote user to perform unauthorized actions due to improper authentication. IBM X-Force ID: 266896.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Partner Engagement Manager Essentials Edition | <=6.1.2, 6.2.0, 6.2.2 | |
IBM Sterling Partner Engagement Manager Standard Edition | <=6.1.2, 6.2.0, 6.2.2 | |
IBM Sterling Partner Engagement Manager | =6.1.2 | |
IBM Sterling Partner Engagement Manager | =6.1.2 | |
IBM Sterling Partner Engagement Manager | =6.2.0 | |
IBM Sterling Partner Engagement Manager | =6.2.0 | |
IBM Sterling Partner Engagement Manager | =6.2.2 | |
IBM Sterling Partner Engagement Manager | =6.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security bypass is CVE-2023-43045.
The severity rating of CVE-2023-43045 is medium with a score of 5.9.
IBM Sterling Partner Engagement Manager versions 6.1.2, 6.2.0, and 6.2.2 are affected by this vulnerability.
A remote user can exploit this vulnerability to perform unauthorized actions due to improper authentication.
Yes, IBM has provided a patch to fix this vulnerability. You can find the patch at the following URL: [IBM Sterling Partner Engagement Manager Patch](https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EOther%20software&product=ibm/Other+software/IBM+Sterling+Partner+Engagement+Manager+Software&release=6.2.2.1&platform=All&function=fixId&fixids=IBM_PEM_Essentials_6.2.2.1.2&includeSupersedes=0)