Monday, April 15, 2024

Multiple IBM Sterling Secure Proxy Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities have been found in IBM Sterling Secure Proxy, mostly related to Denial of Service and Information Disclosure.

It also consisted of a code execution vulnerability and an unidentified vulnerability. The severities of these vulnerabilities vary from 4.5 (Medium) to 9.8 (Critical).

IBM Sterling Secure Proxy is a DMZ-based software proxy application that provides secure high-speed data transfer, perimeter security, and protection against unauthorized access to critical business-internal systems. 

IBM has taken necessary measures to address the vulnerabilities by releasing patches that effectively resolve the issues at hand.

Code Execution & Unidentified Vulnerability

CVE-2022-40609 was one of the vulnerabilities that IBM patched in the security patch related to arbitrary code execution. A remote attacker can exploit this vulnerability by sending crafted data. It exists due to an unsafe deserialization flaw and has a severity of 9.8 (Critical).

Apart from the information disclosure, Denial of service, and the remote code execution vulnerability, there was another vulnerability that was patched but IBM did not provide any additional information about this vulnerability. This flaw affected Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE.

“An unspecified vulnerability in Oracle Java SE, Oracle GraalVM Enterprise Edition related to the JSSE component could allow an unauthenticated attacker to cause high confidentiality impact and high integrity impact.” reads the post by IBM.

DoS and Information Disclosure

In addition to this, there were 8 DoS (Denial of Service) and 2 information disclosure vulnerabilities. As mentioned by IBM, the vulnerabilities with the highest severity among the DoS vulnerabilities were CVE-2023-24998 and CVE-2022-45685.

CVE-2023-24998 affected Apache Commons FileUpload and Tomcat, which exists due to no rate limiting on the number of requested parts that affects the file upload function. An attacker can send a specially crafted request to this function, which could result in a Denial of Service condition.

CVE-2022-45685 is a stack-based buffer overflow vulnerability that can be exploited by sending an overly long string on the JSON data that could result in a denial of service condition. This vulnerability affects Jettison.

CVE IDDescriptionSeverityNVD Score
CVE-2023-26049Eclipse Jetty information disclosure4.5
CVE-2023-32338IBM Sterling Secure Proxy information disclosure5.1
CVE-2023-26048Eclipse Jetty denial of service5.3
CVE-2021-33813JDOM denial of service5.37.5
CVE-2022-45693Jettison denial of service5.3
CVE-2023-1436Jettison denial of service5.37.5
CVE-2023-22874IBM MQ denial of service5.5
CVE-2022-40150jettison-json Jettison denial of service6.57.5
CVE-2023-21930Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE unspecified7.4
CVE-2023-24998Apache Commons FileUpload and Tomcat denial of service7.5
CVE-2022-45685Jettison denial of service7.5
Eclipse Jetty’s denial of serviceIBM SDK, Java Technology Edition code execution8.19.8

Products affected by these vulnerabilities include IBM Sterling Secure Proxy 6.0.3 and 6.1.0. To fix these vulnerabilities, users of these products are recommended to follow the below table.

IBM Sterling Secure Proxy6.1.0GAFix Central
IBM Sterling Secure Proxy6.0.3iFix 08Fix Central

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.


Latest articles

Hacker Customize LockBit 3.0 Ransomware to Attack Orgs Worldwide

Cybersecurity researchers at Kaspersky have uncovered evidence that cybercriminal groups are customizing the virulent...

Microsoft .NET, .NET Framework, & Visual Studio Vulnerable To RCE Attacks

A new remote code execution vulnerability has been identified to be affecting multiple Microsoft...

LightSpy Hackers Indian Apple Device Users to Steal Sensitive Data

The revival of the LightSpy malware campaign has been observed, focusing on Indian Apple...

LightSpy Malware Attacking Android and iOS Users

A new malware known as LightSpy has been targeting Android and iOS users.This sophisticated...

This Startup Aims To Simplify End-to-End Cybersecurity, So Anyone Can Do It

The Web3 movement is going from strength to strength with every day that passes....

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles