Security Bulletin
Summary
IBM Java is used by IBM Sterling Connect:Direct FTP+ on AIX, Linux, Solaris, and Windows platforms in product configuration and data transmission. IBM Sterling Connect:Direct FTP+ on AIX, Linux, Solaris, and Windows platforms is impacted by an unauthorized sensitive information access issue in IBM Java (CVE-2021-35603). IBM Sterling Connect:Direct FTP+ on AIX, Linux, Solaris, and Windows platforms has upgraded IBM Java to version 8.0.7.10 to address the issue.
Vulnerability Details
CVEID: CVE-2021-35603
DESCRIPTION: An unspecified vulnerability in Java SE related to the JSSE component could allow an unauthenticated attacker to obtain sensitive information resulting in a low confidentiality impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/211676 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
Affected Products and Versions
Affected Product(s) | Version(s) |
IBM Sterling Connect:Direct FTP+ | 1.3 |
Remediation/Fixes
IBM strongly recommends addressing the vulnerability now by upgrading
Product | Version | Remediation/Fix/Instructions |
IBM Sterling Connect:Direct FTP+ | 1.3.0 | Apply 1.3.0.iFix021, available on Fix Central. |
For versions previous to 1.3.0, IBM recommends upgrading to a fixed, supported version of the product.
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Change History
24 Jun 2022: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
21 June 2022
UID
ibm16597287