CVE-2023-22863
IBM Robotic Process Automation information disclosure
Severity Score
5.9
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
IBM Robotic Process Automation 20.12.0 through 21.0.2 defaults to HTTP in some RPA commands when the prefix is not explicitly specified in the URL. This could allow an attacker to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 244109.
IBM Robotic Process Automation 20.12.0 a 21.0.2 utiliza de forma predeterminada HTTP en algunos comandos RPA cuando el prefijo no se especifica explícitamente en la URL. Esto podría permitir a un atacante obtener información confidencial utilizando técnicas de intermediario. ID de IBM X-Force: 244109.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-01-09 CVE Reserved
- 2023-01-18 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-319: Cleartext Transmission of Sensitive Information
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.ibm.com/support/pages/node/6855837 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/244109 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ibm Search vendor "Ibm" | Robotic Process Automation Search vendor "Ibm" for product "Robotic Process Automation" | < 21.0.3 Search vendor "Ibm" for product "Robotic Process Automation" and version " < 21.0.3" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Robotic Process Automation Search vendor "Ibm" for product "Robotic Process Automation" | < 21.0.3 Search vendor "Ibm" for product "Robotic Process Automation" and version " < 21.0.3" | - |
Affected
| in | Redhat Search vendor "Redhat" | Openshift Search vendor "Redhat" for product "Openshift" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Robotic Process Automation As A Service Search vendor "Ibm" for product "Robotic Process Automation As A Service" | < 21.0.3 Search vendor "Ibm" for product "Robotic Process Automation As A Service" and version " < 21.0.3" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Robotic Process Automation As A Service Search vendor "Ibm" for product "Robotic Process Automation As A Service" | < 21.0.3 Search vendor "Ibm" for product "Robotic Process Automation As A Service" and version " < 21.0.3" | - |
Affected
| in | Redhat Search vendor "Redhat" | Openshift Search vendor "Redhat" for product "Openshift" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Robotic Process Automation For Cloud Pak Search vendor "Ibm" for product "Robotic Process Automation For Cloud Pak" | < 21.0.3 Search vendor "Ibm" for product "Robotic Process Automation For Cloud Pak" and version " < 21.0.3" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Robotic Process Automation For Cloud Pak Search vendor "Ibm" for product "Robotic Process Automation For Cloud Pak" | < 21.0.3 Search vendor "Ibm" for product "Robotic Process Automation For Cloud Pak" and version " < 21.0.3" | - |
Affected
| in | Redhat Search vendor "Redhat" | Openshift Search vendor "Redhat" for product "Openshift" | - | - |
Safe
|