Alert!

IBM seals code smuggling leak and more in Security Guardium

IBM has provided updates for its Security Guardium cloud security software. They close security gaps, some of which are critical.

listen Print view
Stilisiertes Bild: Laptop steht auf Schreibtisch vor Serverschränken, es brennt

Security gaps jeopardize network security.

(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)

2 min. read

IBM's cloud security software Security Guardium has several security gaps, some of which are critical. Not only is the core software affected, but third-party software packages supplied with the software also have vulnerabilities. IT managers should apply the available updates without delay.

In a security bulletin, IBM warn s of the security vulnerabilities in Security Guardium. The authors of the announcement list a total of ten security vulnerabilities, three of which directly affect IBM Security Guardium itself. With carefully prepared requests, registered attackers can send arbitrary commands into the system remotely, writes IBM, without explaining what an attack could look like (CVE-2023-47709, CVSS 9.1, risk"critical"). Local users can increase their access rights due to an inadequate rights check (CVE-2023-47712, CVSS 7.8, high). A denial of service vulnerability in Security Guardium can be provoked by uploading files (CVE-2023-47711, CVSS 2.7, low).

The supplied PostgreSQL database allows malicious authenticated actors from the network to inject arbitrary malicious code by provoking a buffer overflow with a manipulated request (CVE-2023-5869, CVSS 8.8, high). They can also exploit a denial-of-service vulnerability (CVE-2023-5870, CVSS 2.2, low). The software package from IBM also contains components from VMware that open up security gaps. In addition, the X.Org X server allows code smuggling (CVE-2023-5367, CVSS 7.8, high).

Videos by heise

According to IBM, there are no temporary countermeasures to close the security gaps. Only updating to bug-fixed versions of IBM Security Guardium 11.3, 11.4, 11.5 and 12.0 will correct the problems. The patches restore the January patch level, the security release is from the weekend. IBM recommends that admins update their systems immediately.

IBM last patched a high-risk vulnerability in Security Guardium at the end of November. Attackers could have infiltrated their own commands with manipulated CSV files.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.