Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-32210 |
CWE-ID | CWE-295 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
App Connect Enterprise Certified Container Server applications / Other server solutions |
Vendor | IBM Corporation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU64942
Risk: Low
CVSSv4.0: 0.9 [CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-32210
CWE-ID:
CWE-295 - Improper Certificate Validation
Exploit availability: No
DescriptionThe vulnerability allows a remote user on the local network to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote authenticated user on the local network can send a specially crafted request to obtain sensitive information of all the requests and responses data to the proxy, and use this information to launch further attacks against the affected system.
MitigationInstall update from vendor's website.
Vulnerable software versionsApp Connect Enterprise Certified Container: 1.1 - 4.0.0
CPE2.3https://www.ibm.com/support/pages/node/6601261
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.