High Severity

Security Bulletin: Multiple security vulnerabilities fixed in IBM Security Verify Access Appliance (CVE-2022-23308, CVE-2021-23840, CVE-2021-23841, CVE-2021-3712)

Share this post:

Multiple security vulnerabilities found in IBM Security Verify Access Appliance have been fixed.

CVE(s): CVE-2022-23308, CVE-2021-23840, CVE-2021-23841, CVE-2021-3712

Affected product(s) and affected version(s):

Affected Product(s) Version(s)
IBM Security Verify Access 10.0.0

Refer to the following reference URLs for remediation and additional vulnerability details:  
Source Bulletin: https://www.ibm.com/support/pages/node/6601731
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/220772
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/196848
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/196847
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/208073

More stories

Security Bulletin: Automation Assets in IBM Cloud Pak for Integration is vulnerable to denial of service due to CVE-2022-31129

August 10, 2022 | High Severity

Automation Assets in IBM Cloud Pak for Integration is vulnerable to denial of service due to CVE-2022-31129 with details below ...read more


Security Bulletin: Multiple security vulnerabilities has been identified in IBM® DB2® shipped with IBM PureData System for Operational Analytics

August 10, 2022 | High Severity

IBM® DB2® is shipped as a component of IBM PureData System for Operational Analytics. Information about security vulnerabilities affecting IBM DB2 have been published in a security bulletin (CVE-2022-22389, CVE-2022-22390, CVE-2022-25313, CVE-2022-25236, CVE-2022-25235, CVE-2022-25314, CVE-2022-25315). ...read more


Security Bulletin: Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to multiple vulnerabilities

August 10, 2022 | High Severity

Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to multiple vulnerabilities with details below ...read more