Lucene search

K
ibmIBMB0AA5FB92DFA921EB6402664B10CA7A958E5522DD091F13F8F783110F9B4EDB7
HistoryJul 23, 2021 - 9:09 p.m.

Security Bulletin: PostgreSQL vulnerabilities in IBM Robotic Process Automation with Automation Anywhere - CVE-2020-25695, CVE-2020-25694

2021-07-2321:09:32
www.ibm.com
30

0.026 Low

EPSS

Percentile

90.3%

Summary

IBM Robotic Process Automation with Automation Anywhere is vulnerable to attacks involving PostgreSQL.

Vulnerability Details

Refer to the security bulletin(s) listed in the Remediation/Fixes section

Affected Products and Versions

Affected Product(s) Version(s)
IBM Robotic Process Automation with Automation Anywhere 11.0

Remediation/Fixes

CVEID:CCVE-2020-25695
**DESCRIPTION:**A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVSS Base score: 8.8
CVSS Temporal Score: See: <https://exchange.xforce.ibmcloud.com/vulnerabilities/191771&gt; for the current score.
CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

CVEID:CVE-2020-25694
**DESCRIPTION:**A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability…
CVSS Base score: 8.1
CVSS Temporal Score: See: <https://exchange.xforce.ibmcloud.com/vulnerabilities/191770&gt; for the current score.
CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Workarounds and Mitigations

None