IBM Support

Security Bulletin: IBM Sterling Connect:Direct for UNIX container is vulnerable to obtain sensitive information due to OpenSSL (CVE-2022-2097)

Security Bulletin


Summary

There is a vulnerability in the OpenSSL library used by IBM Sterling Connect:Direct for UNIX container. IBM Sterling Connect:Direct for UNIX Container has addressed the applicable issue by upgrading OpenSSL to 1.1.1k.

Vulnerability Details

CVEID:   CVE-2022-2097
DESCRIPTION:   OpenSSL could allow a remote attacker to obtain sensitive information, caused by improper encryption of data by the AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/230425 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Affected Product(s)Version(s)
IBM Sterling Connect:Direct for UNIX6.0.0
IBM Sterling Connect:Direct for UNIX6.1.0
IBM Sterling Connect:Direct for UNIX6.2.0

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading

ProductVersionRemediation/Fix/Instructions
IBM Sterling Connect:Direct for UNIX6.2.0Apply Helm chart - 1.2.5, as per instructions.
IBM Sterling Connect:Direct for UNIX6.1.0Apply Helm chart - 1.2.5, as per instructions.
IBM Sterling Connect:Direct for UNIX6.0.0Apply Helm chart - 1.2.5, as per instructions.

 

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

07 Sep 2022: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSKTYY","label":"Sterling Connect:Direct for UNIX"},"Component":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"6.2.0, 6.1.0, 6.0.0, 4.3.0","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]

Document Information

Modified date:
15 September 2022

Initial Publish date:
07 September 2022

UID

ibm16620647