IBM Support

IT36627: ADDRESS FALSE-POSITIVE VULNERABILITY FINDINGS REPORTED BY SCAN UTILITIES

Subscribe to this APAR

By subscribing, you receive periodic emails alerting you to the status of the APAR, along with a link to the fix after it becomes available. You can track this item individually or track all items by product.

Notify me when this APAR changes.

Notify me when an APAR for this component changes.

 

APAR status

  • Closed as program error.

Error description

  • The change addresses the following alerts so that they are no
    longer falsely flagging DataPower firmware:
    CVE-2021-21353
    CVE-2020-28500, CVE-2021-23337
    PRISMA-2021-0033
    
    While the firmware was not vulnerable to these exploits some
    security tools would flag the firmware as being vulnerable so
    this change would make sure to prevent that misconception.
    

Local fix

Problem summary

  • CORS could be misconfigured.
    

Problem conclusion

  • Fix is available in 2018.4.1.17 and 10.0.1.4.
    

Temporary fix

Comments

APAR Information

  • APAR number

    IT36627

  • Reported component name

    DATAPOWER

  • Reported component ID

    DP1234567

  • Reported release

    A0X

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2021-05-03

  • Closed date

    2021-08-04

  • Last modified date

    2021-08-04

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    DATAPOWER

  • Fixed component ID

    DP1234567

Applicable component levels

[{"Line of Business":{"code":"LOB45","label":"Automation"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SS9H2Y","label":"IBM DataPower Gateways"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"A0X"}]

Document Information

Modified date:
05 August 2021