Lucene search

K
ibmIBM3B9905D1C52B7E3513CFB37205071201B0CBD627E2AF411DF48214EF87C99046
HistorySep 28, 2022 - 7:11 p.m.

Security Bulletin: IBM Robotic Process Automation is vulnerable to proxy credential exposure in upgrade logs (CVE-2022-39168)

2022-09-2819:11:25
www.ibm.com
23
ibm robotic process automation
vulnerability
proxy credential exposure
upgrade logs
cloud pak
remediation
mitigation

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

43.3%

Summary

IBM Robotic Process Automation Client is vulnerable to proxy credential exposure in upgrade logs.

Vulnerability Details

CVEID:CVE-2022-39168
**DESCRIPTION:**IBM Robotic Process Automation Clients are vulnerable to proxy credentials being exposed in upgrade logs.
CVSS Base score: 4.6
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/235422 for the current score.
CVSS Vector: (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Robotic Process Automation for Cloud Pak 21.0.3, 21.0.4
IBM Robotic Process Automation as a Service 21.0.3, 21.0.4
IBM Robotic Process Automation 21.0.3, 21.0.4

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.

Product(s) **Version(s) number and/or range ** Remediation/Fix/Instructions
IBM Robotic Process Automation 21.0.3-21.0.4 Download 21.0.5 and follow instructions.
IBM Robotic Process Automation for Cloud Pak 21.0.3-21.0.4 Download 21.0.5 and follow instructions.
IBM Robotic Process Automation as a Service 21.0.3-21.0.4 Download the 21.0.5 client from the Control Center and follow instructions.

Workarounds and Mitigations

Workarounds/Mitigation guidance:

If you use a proxy configuration and you have previously upgraded to 21.0.3.x or 21.0.4 delete the C:\ProgramData\IBM Robotic Process Automation\Setup\SetupServices.log file or alternatively, edit the file to remove proxy credentials.

Affected configurations

Vulners
Node
ibmrobotic_process_automationMatch21.0.3
OR
ibmrobotic_process_automationMatch21.0.4
VendorProductVersionCPE
ibmrobotic_process_automation21.0.3cpe:2.3:a:ibm:robotic_process_automation:21.0.3:*:*:*:*:*:*:*
ibmrobotic_process_automation21.0.4cpe:2.3:a:ibm:robotic_process_automation:21.0.4:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

43.3%

Related for 3B9905D1C52B7E3513CFB37205071201B0CBD627E2AF411DF48214EF87C99046