Multiple vulnerabilities have been found in IBM Sterling Secure Proxy, mostly related to Denial of Service and Information Disclosure.

It also consisted of a code execution vulnerability and an unidentified vulnerability. The severities of these vulnerabilities vary from 4.5 (Medium) to 9.8 (Critical).

IBM Sterling Secure Proxy is a DMZ-based software proxy application that provides secure high-speed data transfer, perimeter security, and protection against unauthorized access to critical business-internal systems. 

IBM has taken necessary measures to address the vulnerabilities by releasing patches that effectively resolve the issues at hand.

Code Execution & Unidentified Vulnerability

CVE-2022-40609 was one of the vulnerabilities that IBM patched in the security patch related to arbitrary code execution. A remote attacker can exploit this vulnerability by sending crafted data. It exists due to an unsafe deserialization flaw and has a severity of 9.8 (Critical).

Apart from the information disclosure, Denial of service, and the remote code execution vulnerability, there was another vulnerability that was patched but IBM did not provide any additional information about this vulnerability. This flaw affected Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE.

“An unspecified vulnerability in Oracle Java SE, Oracle GraalVM Enterprise Edition related to the JSSE component could allow an unauthenticated attacker to cause high confidentiality impact and high integrity impact.” reads the post by IBM.

DoS and Information Disclosure

In addition to this, there were 8 DoS (Denial of Service) and 2 information disclosure vulnerabilities. As mentioned by IBM, the vulnerabilities with the highest severity among the DoS vulnerabilities were CVE-2023-24998 and CVE-2022-45685.

CVE-2023-24998 affected Apache Commons FileUpload and Tomcat, which exists due to no rate limiting on the number of requested parts that affects the file upload function. An attacker can send a specially crafted request to this function, which could result in a Denial of Service condition.

CVE-2022-45685 is a stack-based buffer overflow vulnerability that can be exploited by sending an overly long string on the JSON data that could result in a denial of service condition. This vulnerability affects Jettison.

CVE IDDescriptionSeverityNVD Score
CVE-2023-26049Eclipse Jetty information disclosure4.5
CVE-2023-32338IBM Sterling Secure Proxy information disclosure5.1
CVE-2023-26048Eclipse Jetty denial of service5.3
CVE-2021-33813JDOM denial of service5.37.5
CVE-2022-45693Jettison denial of service5.3
CVE-2023-1436Jettison denial of service5.37.5
CVE-2023-22874IBM MQ denial of service5.5
CVE-2022-40150jettison-json Jettison denial of service6.57.5
CVE-2023-21930Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE unspecified7.4
CVE-2023-24998Apache Commons FileUpload and Tomcat denial of service7.5
CVE-2022-45685Jettison denial of service7.5
Eclipse Jetty’s denial of serviceIBM SDK, Java Technology Edition code execution8.19.8

Products affected by these vulnerabilities include IBM Sterling Secure Proxy 6.0.3 and 6.1.0. To fix these vulnerabilities, users of these products are recommended to follow the below table.

IBM Sterling Secure Proxy6.1.0GAFix Central
IBM Sterling Secure Proxy6.0.3iFix 08Fix Central

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.


Please enter your comment!
Please enter your name here