Multiple vulnerabilities in IBM Sterling Secure Proxy



Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2024-25016
CVE-2024-38337
CWE-ID CWE-20
CWE-732
Exploitation vector Network
Public exploit N/A
Vulnerable software
IBM Sterling Secure Proxy
Server applications / Other server solutions

Vendor IBM Corporation

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU87128

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-25016

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect buffering logic. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling Secure Proxy: All versions

CPE2.3 External links

https://www.ibm.com/support/pages/node/7179166


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Incorrect permission assignment for critical resource

EUVDB-ID: #VU102064

Risk: High

CVSSv4.0: 6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-38337

CWE-ID: CWE-732 - Incorrect Permission Assignment for Critical Resource

Exploit availability: No

Description

The vulnerability allows a remote attacker to retrieve or alter sensitive information.

The vulnerability exists due to excessive data output by the application. A remote attacker can retrieve or alter sensitive information contents due to incorrect permission assignments.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling Secure Proxy: All versions

CPE2.3 External links

https://www.ibm.com/support/pages/node/7179166


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###