IBM this week announced patches for high-severity vulnerabilities in IBM MQ, warning that attackers could exploit them to bypass security restrictions or access sensitive information.
Messaging and queuing middleware, IBM MQ provides enterprise-grade messaging between applications, enabling the transfer of data between programs and the sending of messages to multiple subscribers.
Two security issues were resolved in IBM MQ this week, both residing within the libcurl library. Both flaws can be exploited remotely, IBM notes in an advisory.
Tracked as CVE-2022-27780, the first of these bugs could allow an attacker to bypass security restrictions using a specially crafted host name in a URL.
The second vulnerability, CVE-2022-30115, exists because of a HSTS check bypass flaw and could be exploited to obtain sensitive information over clear-text HTTP.
IBM MQ versions 9.2 LTS, 9.1 LTS, 9.0 LTS, 9.2 CD, and 9.1 CD were found vulnerable. Both vulnerabilities were addressed under APAR IT40933.
This week, IBM also resolved a medium-severity information leak in the SANNav software used by IBM b-type SAN directors and switches, caused by improper encryption of data.
IBM also announced a fix for a high-severity denial-of-service (DoS) vulnerability in Sterling Connect:Direct for UNIX. Tracked as CVE-2022-25647, the bug impacts Google Gson and is caused by the deserialization of untrusted data.
According to IBM, a remote attacker could exploit this vulnerability by using the writeReplace() method. Sterling Connect:Direct for UNIX 6.2.0.4.iFix018 resolves the issue.
IBM has also updated several advisories detailing severe bugs in Security Guardium Key Lifecycle Manager (SKLM/GKLM), Sterling B2B Integrator, and Security Verify Governance (ISVG).
Further information on the resolved vulnerabilities can be found on IBM’s product security page.
Related: GitLab Patches Critical Remote Code Execution Vulnerability
Related: Cisco Squashes High-Severity Bug in Web Protection Solution
Related: Quarterly Security Patches Released for Splunk Enterprise
More from Ionut Arghire
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- Apria Healthcare Notifying 2 Million People of Years-Old Data Breaches
- European Cybersecurity Firm Sekoia.io Raises $37.5 Million
- GitLab Security Update Patches Critical Vulnerability
- Android App With 50,000 Downloads in Google Play Turned Into Spyware via Update
- US Sanctions North Korean University for Training Hackers
- New ‘GoldenJackal’ APT Targets Middle East, South Asia Governments
- Iranian Hackers Using New Windows Kernel Driver in Attacks
Latest News
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Security Pros: Before You Do Anything, Understand Your Threat Landscape
- Major Massachusetts Health Insurer Hit by Ransomware Attack, Member Data May Be Compromised
- Apria Healthcare Notifying 2 Million People of Years-Old Data Breaches
- European Cybersecurity Firm Sekoia.io Raises $37.5 Million
- Today’s Cyber Defense Challenges: Complexity and a False Sense of Security
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations

