Lucene search

K
ibmIBMEC1E93BF6B65FE545DF326F5A7F75308F93B40BD71342C4A0073989F1D85D6FD
HistoryMay 10, 2023 - 5:52 p.m.

Security Bulletin: IBM MQ trace can inadvertently trace sensitive data (CVE-2023-28950)

2023-05-1017:52:53
www.ibm.com
24
ibm mq
sensitive data
trace files
security update
fix pack
java messaging
advanced message security

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0

Percentile

9.0%

Summary

When Advanced Message Security setup is enabled, an issue was identified with IBM MQ tracing logic that meant sensitive data could be captured while IBM MQ trace was running. This data would be stored in plaintext within the IBM MQ trace files.

Vulnerability Details

CVEID:CVE-2023-28950
**DESCRIPTION:**IBM MQ could disclose sensitive user information from a trace file if that functionality has been enabled.
CVSS Base score: 5.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/251358 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM MQ 8.0
IBM MQ 9.0 LTS
IBM MQ 9.1 LTS
IBM MQ 9.2 CD
IBM MQ 9.3 CD
IBM MQ 9.2 LTS
IBM MQ 9.3 LTS

The following installable MQ components are affected by the vulnerability:

- Advanced Message Security (AMS)
- Java messaging

If you are running any of these listed components, please apply the remediation/fixes as described below. For more information on the definitions of components used in this list see <https://www.ibm.com/support/pages/installable-component-names-used-ibm-mq-security-bulletins&gt;

Remediation/Fixes

This issue was resolved under APAR IT43335

IBM MQ 8.0

Users with an appropriate extended support entitlement should contact IBM support.

IBM MQ 9.0 LTS

Apply cumulative security update 9.0.0.17

IBM MQ 9.1 LTS

Apply FixPack 9.1.0.15

IBM MQ 9.2 LTS

Apply cumulative security update 9.2.0.11

IBM MQ 9.3 LTS

Apply FixPack 9.3.0.5

IBM MQ 9.1 CD, 9.2 CD and 9.3 CD

Upgrade to IBM MQ 9.3.2 and apply cumulative security update 9.3.2.1

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmmqMatch8.0.0
OR
ibmmqMatch9.0.0
OR
ibmmqMatch9.1.0
OR
ibmmqMatch9.2.0
OR
ibmmqMatch9.3.0
VendorProductVersionCPE
ibmmq8.0.0cpe:2.3:a:ibm:mq:8.0.0:*:*:*:*:*:*:*
ibmmq9.0.0cpe:2.3:a:ibm:mq:9.0.0:*:*:*:*:*:*:*
ibmmq9.1.0cpe:2.3:a:ibm:mq:9.1.0:*:*:*:*:*:*:*
ibmmq9.2.0cpe:2.3:a:ibm:mq:9.2.0:*:*:*:*:*:*:*
ibmmq9.3.0cpe:2.3:a:ibm:mq:9.3.0:*:*:*:*:*:*:*

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0

Percentile

9.0%

Related for EC1E93BF6B65FE545DF326F5A7F75308F93B40BD71342C4A0073989F1D85D6FD