IBM QRadar SIEM Bug Let Remote Attacker Trigger DoS

by Esmeralda McKenzie
IBM QRadar SIEM Bug Let Remote Attacker Trigger DoS

IBM QRadar SIEM Bug Let Remote Attacker Trigger DoS

IBM QRadar SIEM Malicious program

A pair of vulnerabilities were learned in IBM QRadar Wincollect, which were associated with denial of provider that could maybe also allow a threat actor to disrupt the provider from utilization. These vulnerabilities were assigned with CVEs CVE-2023-38039, CVE-2023-1255, and CVE-2022-25883.

IBM has released security patches for fixing these vulnerabilities, at the side of a security advisory. Moreover, users are advised to patch them.

EHA

CVE-2022-25883: Denial of Service in Node.js semver kit

This vulnerability is associated with the Node.js semver kit which is which potential of a usual expression denial-of-provider (ReDoS) flaw in the recent vary feature. A threat actor could maybe also use a specially crafted regex enter to milk this vulnerability. The severity for this vulnerability has been given as 5.3 (Medium).

CVE-2023-1255: Denial of Service in OpenSSL

This vulnerability is display cloak in the OpenSSL which potential of a flaw in the implementation of AES-XTS cipher decryption for 64-bit ARM platforms. A threat actor could maybe also ship a specially crafted quiz that could maybe also result in crashing the utility. The severity for this vulnerability has been given as 3.7 (Low)

File

Free Webinar

Dwell API Attack Simulation Webinar

Within the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Merchandise at Indusface level to how APIs will likely be hacked. The session will quilt: an exploit of OWASP API Top 10 vulnerability, a brute force account clutch-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could maybe also bolster security over an API gateway

CVE-2023-38039: Denial of Service in cURL libcurl

This vulnerability exists in the cURL libcurl library which potential of insufficient limitation of the volume and dimension of headers well-liked in a response. A threat actor could maybe also ship a specially crafted quiz, which could maybe also employ the heap memory and result in a denial of provider situation. The severity of this vulnerability has been given as 7.5 (Excessive).

A entire document has been revealed by IBM, providing detailed records on these and a range of different vulnerabilities.

Affected Merchandise & Fastened in Model

Affected Product(s) Model(s) Fastened in Model
QRadar WinCollect Agent 10.0-10.1.7 WinCollect Standalone Agent 10.1.8 VersionsWinCollect Agent MSI (64-bit) – Standalone onlyWinCollect Agent MSI (32-bit) – Standalone most attention-grabbing

Users of this product are beneficial to upgrade to basically the most modern model to discontinue these vulnerabilities from getting exploited by threat actors.

Source credit : cybersecuritynews.com

Related Posts