SB2024041923 - Multiple vulnerabilities in IBM Aspera Faspex
Published: April 19, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2023-22869)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to software stores sensitive information into log files. A local user can read the log files and gain access to sensitive data.
2) Inadequate Encryption Strength (CVE-ID: CVE-2023-37396)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A local user can gain unauthorized access to sensitive information on the system.
3) Resource exhaustion (CVE-ID: CVE-2023-27279)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to missing API rate limiting. A remote user can trigger resource exhaustion and perform a denial of service (DoS) attack.
4) Inadequate Encryption Strength (CVE-ID: CVE-2023-37395)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to improper encryption of certain data. A local user can gain unauthorized access to sensitive information on the system.
5) Inadequate Encryption Strength (CVE-ID: CVE-2023-37397)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to improper encryption of certain data. A local user can gain unauthorized access to sensitive information on the system.
6) Inadequate Encryption Strength (CVE-ID: CVE-2022-40745)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to weaker than expected security. A local user can gain unauthorized access to sensitive information on the system.
Remediation
Install update from vendor's website.