First published: Tue Mar 26 2024(Updated: )
IBM QRadar could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Security Information and Event Manager | =7.5.0 | |
IBM QRadar Security Information and Event Manager | =7.5.0-update_pack_1 | |
IBM QRadar Security Information and Event Manager | =7.5.0-update_pack_2 | |
IBM QRadar Security Information and Event Manager | =7.5.0-update_pack_3 | |
IBM QRadar Security Information and Event Manager | =7.5.0-update_pack_4 | |
IBM QRadar Security Information and Event Manager | =7.5.0-update_pack_5 | |
IBM QRadar Security Information and Event Manager | =7.5.0-update_pack_6 | |
IBM Security QRadar | <=7.5 - 7.5.0 UP7 IF06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50961 has been classified as a high severity vulnerability due to the potential for remote command execution.
To mitigate CVE-2023-50961, ensure you update IBM QRadar SIEM to a version that is not vulnerable, specifically above 7.5.0 UP7 IF06.
CVE-2023-50961 can facilitate remote authenticated attackers executing arbitrary commands on the IBM QRadar system.
IBM QRadar SIEM versions up to and including 7.5.0 UP7 IF06 are affected by CVE-2023-50961.
Yes, CVE-2023-50961 requires an authenticated user to exploit the vulnerability.