8.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
7.8 High
AI Score
Confidence
Low
0.003 Low
EPSS
Percentile
70.1%
Vulnerabilities were identified within Docker shipped as pattern type (pType) component with Cloud Pak System Software. IBM Cloud Pak System Software addressed these vulnerabilities [CVE-2023-28840, CVE-2023-28841, CVE-2023-28842].
CVEID:CVE-2023-28840
**DESCRIPTION:**Moby is vulnerable to a denial of service, caused by an unprotected alternate channel within encrypted overlay networks. By sending a specially crafted request to inject arbitrary Ethernet frames into the encrypted overlay network, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/251927 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L)
CVEID:CVE-2023-28841
**DESCRIPTION:**Moby could allow a remote attacker to obtain sensitive information, caused by the missing of encrypted sensitive data within the overlay network driver. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/251928 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N)
CVEID:CVE-2023-28842
**DESCRIPTION:**Moby could allow a remote attacker to bypass security restrictions, caused by an unprotected alternate channel within encrypted overlay networks. By sending a specially crafted request, an attacker could exploit this vulnerability to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/251929 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM Cloud Pak System | 2.3.3.0 - 2.3.3.6 (Intel) |
IBM Cloud Pak System Software Suite | 2.3.3.0 - 2.3.3.6 (Intel) |
For earlier and unsupported versions of the products, IBM recommends upgrading to a fixed, supported version of the product.
The recommended solution is to apply the applicable IBM Cloud Pak System Interim Fix as soon as practical.
IBM Cloud Pak System V2.3.3.6 Interim Fix 1 provides pType docker v20.10.24.
For IBM Cloud Pak System V2.3.0.1 - V2.3.3.5,
- Upgrade to IBM Cloud Pak System V2.3.3.6
- apply Cloud Pak System v2.3.3.6 Interim Fix 1 at IBM Fix Central.
Information on upgrading here <https://www.ibm.com/support/pages/node/6959035>
For IBM Cloud Pak System V2.3.3.6
- Upgrade to Cloud Pak System v2.3.3.6 Interim Fix 1 at IBM Fix Central.
Information on upgrading here <https://www.ibm.com/support/pages/node/7017280>
None
CPE | Name | Operator | Version |
---|---|---|---|
ibm cloud pak system software | eq | 2.3.3 |
8.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
7.8 High
AI Score
Confidence
Low
0.003 Low
EPSS
Percentile
70.1%