First published: Fri May 10 2024(Updated: )
IBM Security Guardium 11.3, 11.4, 11.5, and 12.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 271524.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium z/OS | <=11.3 | |
IBM InfoSphere Guardium z/OS | <=11.4 | |
IBM InfoSphere Guardium z/OS | <=11.5 | |
IBM InfoSphere Guardium z/OS | <=12.0 | |
IBM InfoSphere Guardium z/OS | =11.3 | |
IBM InfoSphere Guardium z/OS | =11.4 | |
IBM InfoSphere Guardium z/OS | =11.5 | |
IBM InfoSphere Guardium z/OS | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47709 has a medium severity rating due to the potential for remote command execution by authenticated attackers.
To fix CVE-2023-47709, update IBM Security Guardium to a version beyond 12.0 that addresses this vulnerability.
CVE-2023-47709 affects IBM Security Guardium versions 11.3, 11.4, 11.5, and 12.0.
CVE-2023-47709 can be exploited by remote authenticated attackers who send specially crafted requests to the system.
CVE-2023-47709 enables attackers to execute arbitrary commands on the affected system.