IBM App Connect Enterprise up to 11.0.0.19/12.0.5.0 Discovery Connector Node information disclosure

CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.8 | $0-$5k | 0.00 |
A vulnerability was found in IBM App Connect Enterprise up to 11.0.0.19/12.0.5.0 and classified as problematic. Affected by this issue is an unknown functionality of the component Discovery Connector Node. The manipulation with an unknown input leads to a information disclosure vulnerability. Using CWE to declare the problem leads to CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. Impacted is confidentiality. CVE summarizes:
IBM App Connect Enterprise 11.0.0.17 through 11.0.0.19 and 12.0.4.0 and 12.0.5.0 contains an unspecified vulnerability in the Discovery Connector nodes which may cause a 3rd party system’s credentials to be exposed to a privileged attacker. IBM X-Force ID: 238211.
The weakness was presented 02/07/2023 by The discovery. The advisory is available at ibm.com. This vulnerability is handled as CVE-2022-42439 since 10/06/2022. The technical details are unknown and an exploit is not available. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 03/05/2023). It is expected to see the exploit prices for this product increasing in the near future.This vulnerability is assigned to T1592 by the MITRE ATT&CK project.
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at X-Force (238211).
Product
Vendor
Name
License
- commercial
CPE 2.3
CPE 2.2
CVSSv3
VulDB Meta Base Score: 4.8VulDB Meta Temp Score: 4.8
VulDB Base Score: 2.7
VulDB Temp Score: 2.6
VulDB Vector: 🔒
VulDB Reliability: 🔍
NVD Base Score: 4.9
NVD Vector: 🔒
CNA Base Score: 6.8
CNA Vector (IBM Corporation): 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: Information disclosureCWE: CWE-200 / CWE-284 / CWE-266
ATT&CK: T1592
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔒
Timeline
10/06/2022 CVE reserved02/07/2023 Advisory disclosed
02/07/2023 VulDB entry created
03/05/2023 VulDB last update
Sources
Vendor: ibm.comAdvisory: ibm.com
Researcher: The discovery
Status: Confirmed
CVE: CVE-2022-42439 (🔒)
X-Force: 238211
Entry
Created: 02/07/2023 07:52 AMUpdated: 03/05/2023 04:47 PM
Changes: 02/07/2023 07:52 AM (52), 03/05/2023 04:47 PM (11)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.