IBM Support

Security Bulletin: IBM MQ Appliance is vulnerable to improper session invalidation (CVE-2022-40230)

Security Bulletin


IBM MQ Appliance has resolved an improper session validation vulnerability.

Vulnerability Details

CVEID:   CVE-2022-40230
DESCRIPTION:   IBM MQ Appliance does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system.
CVSS Base score: 5
CVSS Temporal Score: See: for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

Affected Product(s)Version(s)
IBM MQ Appliance9.3 LTS
IBM MQ Appliance9.2 CD
IBM MQ Appliance9.2 LTS
IBM MQ Appliance9.3 CD


This vulnerability is addressed under IT41997

IBM strongly recommends addressing the vulnerability now.

IBM MQ Appliance version 9.2 LTS
Apply interim fix firmware for IT41997, or later firmware.
IBM MQ Appliance version 9.2 CD
Apply 9.2.5 CSU03, or later firmware.
IBM MQ Appliance version 9.3 LTS
Apply IBM MQ Appliance fixpack, or later firmware.
IBM MQ Appliance version 9.3 CD

Workarounds and Mitigations


Get Notified about Future Security Bulletins




Change History

14 Sep 2022: Initial Publication
10 Feb 2023: Update of fix links

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location


[{"Business Unit":{"code":"BU053","label":"Cloud \u0026 Data Platform"},"Product":{"code":"SS5K6E","label":"IBM MQ Appliance"},"Component":"","Platform":[{"code":"PF004","label":"Appliance"}],"Version":";;;;;;;9.2.1;9.2.2;9.2.3;9.2.4;9.2.5;9.2.5 CSU01;9.2.5 CSU02;","Edition":"","Line of Business":{"code":"LOB36","label":"IBM Automation"}}]

Document Information

Modified date:
10 February 2023