// For flags

CVE-2023-22863

IBM Robotic Process Automation information disclosure

Severity Score

5.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

IBM Robotic Process Automation 20.12.0 through 21.0.2 defaults to HTTP in some RPA commands when the prefix is not explicitly specified in the URL. This could allow an attacker to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 244109.

IBM Robotic Process Automation 20.12.0 a 21.0.2 utiliza de forma predeterminada HTTP en algunos comandos RPA cuando el prefijo no se especifica explícitamente en la URL. Esto podría permitir a un atacante obtener información confidencial utilizando técnicas de intermediario. ID de IBM X-Force: 244109.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-01-09 CVE Reserved
  • 2023-01-18 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-10 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-319: Cleartext Transmission of Sensitive Information
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ibm
Search vendor "Ibm"
Robotic Process Automation
Search vendor "Ibm" for product "Robotic Process Automation"
< 21.0.3
Search vendor "Ibm" for product "Robotic Process Automation" and version " < 21.0.3"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Ibm
Search vendor "Ibm"
Robotic Process Automation
Search vendor "Ibm" for product "Robotic Process Automation"
< 21.0.3
Search vendor "Ibm" for product "Robotic Process Automation" and version " < 21.0.3"
-
Affected
in Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
--
Safe
Ibm
Search vendor "Ibm"
Robotic Process Automation As A Service
Search vendor "Ibm" for product "Robotic Process Automation As A Service"
< 21.0.3
Search vendor "Ibm" for product "Robotic Process Automation As A Service" and version " < 21.0.3"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Ibm
Search vendor "Ibm"
Robotic Process Automation As A Service
Search vendor "Ibm" for product "Robotic Process Automation As A Service"
< 21.0.3
Search vendor "Ibm" for product "Robotic Process Automation As A Service" and version " < 21.0.3"
-
Affected
in Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
--
Safe
Ibm
Search vendor "Ibm"
Robotic Process Automation For Cloud Pak
Search vendor "Ibm" for product "Robotic Process Automation For Cloud Pak"
< 21.0.3
Search vendor "Ibm" for product "Robotic Process Automation For Cloud Pak" and version " < 21.0.3"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Ibm
Search vendor "Ibm"
Robotic Process Automation For Cloud Pak
Search vendor "Ibm" for product "Robotic Process Automation For Cloud Pak"
< 21.0.3
Search vendor "Ibm" for product "Robotic Process Automation For Cloud Pak" and version " < 21.0.3"
-
Affected
in Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
--
Safe