IBM CICS TX Standard and Advanced 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 229441.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/229441 | VDB Entry Vendor Advisory |
https://www.ibm.com/support/pages/node/6832922 | Vendor Advisory |
https://www.ibm.com/support/pages/node/6832924 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
10 Oct 2024, 15:12
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
Summary |
|
|
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/229441 - VDB Entry, Vendor Advisory | |
References | () https://www.ibm.com/support/pages/node/6832922 - Vendor Advisory | |
References | () https://www.ibm.com/support/pages/node/6832924 - Vendor Advisory | |
First Time |
Linux linux Kernel
Ibm Linux Ibm cics Tx |
|
CPE | cpe:2.3:a:ibm:cics_tx:11.1.0.0:-:*:*:advanced:*:*:* cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_4:*:*:standard:*:*:* cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_4:*:*:advanced:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_1:*:*:standard:*:*:* cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_1:*:*:advanced:*:*:* cpe:2.3:a:ibm:cics_tx:11.1.0.0:-:*:*:standard:*:*:* cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_2:*:*:advanced:*:*:* cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_2:*:*:standard:*:*:* cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_3:*:*:standard:*:*:* cpe:2.3:a:ibm:cics_tx:*:*:*:*:standard:*:*:* cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_3:*:*:advanced:*:*:* |
12 Feb 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-12 18:15
Updated : 2024-10-10 15:12
NVD link : CVE-2022-34310
Mitre link : CVE-2022-34310
CVE.ORG link : CVE-2022-34310
JSON object : View
Products Affected
ibm
- cics_tx
linux
- linux_kernel
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm