CVE-2023-38272

March 28, 2025, 6:11 p.m.

5.9
Medium

Description

IBM Cloud Pak System 2.3.3.0, 2.3.3.3, 2.3.3.3 iFix1, 2.3.3.4, 2.3.3.5, 2.3.3.6, 2.3.36 iFix1, 2.3.3.6 iFix2, 2.3.3.7, 2.3.3.7 iFix1, 2.3.4.0, and 2.3.4.1 could allow a user with access to the network to obtain sensitive information from CLI arguments.

Product(s) Impacted

Vendor Product Versions
Ibm
  • Cloud Pak System
  • 2.3.3.0, 2.3.3.3, 2.3.3.4, 2.3.3.5, 2.3.3.6, 2.3.36, 2.3.3.7, 2.3.4.0, 2.3.4.1

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-300
Channel Accessible by Non-Endpoint
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a ibm cloud_pak_system 2.3.3.0 / / / / / / /
a ibm cloud_pak_system 2.3.3.3 / / / / / / /
a ibm cloud_pak_system 2.3.3.3 iFix1 / / / / / /
a ibm cloud_pak_system 2.3.3.4 / / / / / / /
a ibm cloud_pak_system 2.3.3.5 / / / / / / /
a ibm cloud_pak_system 2.3.3.6 / / / / / / /
a ibm cloud_pak_system 2.3.36 iFix1 / / / / / /
a ibm cloud_pak_system 2.3.3.6 iFix2 / / / / / /
a ibm cloud_pak_system 2.3.3.7 / / / / / / /
a ibm cloud_pak_system 2.3.3.7 iFix1 / / / / / /
a ibm cloud_pak_system 2.3.4.0 / / / / / / /
a ibm cloud_pak_system 2.3.4.1 / / / / / / /

CVSS Score

5.9 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: NONE
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

    View Vector String

Timeline

Published: March 27, 2025, 6:17 p.m.
Last Modified: March 28, 2025, 6:11 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

psirt@us.ibm.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.