Lucene search

K
ibmIBMFA430F75A8B2C54C0E67D5F1AB238F635A8361AED026C1C4932328820DB37999
HistoryJun 27, 2022 - 4:39 p.m.

Security Bulletin: IBM Robotic Process Automation may be affected by multiple vulnerabilities in open source components (CVE-2019-0820, CVE-2020-15522, CVE-2021-43569)

2022-06-2716:39:27
www.ibm.com
17

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

68.9%

Summary

Multiple vulnerabilities in IBM Robotic Process Automation 21.0.1<br>Bouncy Castle is used by IBM Robotic Process Automation as part of it’s cryptograpy implementation. CVE-2020-15522.<br>Stark Bank Elixir is used by IBM Robotic Process Automation as part of it’s cryptograpy implementation. CVE-2021-43569.<br>IBM Robotic Process Automation is built using C# using Microsoft .NET Framework and Microsoft .NET Core. CVE-2020-15522.<br>

Vulnerability Details

CVEID:CVE-2020-15522
**DESCRIPTION:**Bouncy Castle BC Java, BC C# .NET, BC-FJA, BC-FNA could allow a remote attacker to obtain sensitive information, caused by a timing issue within the EC math library. By utilize cryptographic attack techniques, an attacker could exploit this vulnerability to obtain the private key information, and use this information to launch further attacks against the affected system.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/202188 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID:CVE-2021-43569
**DESCRIPTION:**Stark Bank Elixir .NET ECDSA library (ecdsa-dotnet) could allow a remote attacker to bypass security restrictions, caused by the failure to check that the signature is non-zero. By sending a specially-crafted request, an attacker could exploit this vulnerability to authenticate as any user within the Stark Bank platform, and bypass signature verification needed to perform operations on the platform.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/213249 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID:CVE-2019-0820
**DESCRIPTION:**Microsoft .NET Framework and .NET Core is vulnerable to a denial of service, caused by improper processing of RegEx strings. By sending a specially-crafted request, an attacker could exploit this vulnerability to cause a denial of service condition in .NET application.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/160363 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions


Affected Product(s) Version(s)
IBM Robotic Process Automation 21.0.1 < 21.0.1.5

Remediation/Fixes

** IBM strongly recommends addressing the vulnerability now.**

Product(s)|**Version(s)
**|Remediation/Fix/Instructions
—|—|—
IBM Robotic Process Automation| 21.0.1| Download and apply iFix 21.0.1.5 (21.0.1 IF005)

Workarounds and Mitigations

None, apply the iFix recommended for your version.

Affected configurations

Vulners
Node
ibmrobotic_process_automationMatch21.0.1
CPENameOperatorVersion
ibm robotic process automationeq21.0.1

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

68.9%