Upgrade OPS/MVS RESTAPI to Zowe SDK v2.8.3
24445
04 June 2024
04 June 2024
OPEN
HIGH
8.1
CVE-2024-22259
Broadcom Mainframe Software is alerting customers to a vulnerability in OPS/MVS (RESTAPI)
Product Name | OPS/MVS 14.0 |
Affected component(s) | FMID:CCLXE01 |
Version PE was Introduced | FMID in Error: CCLXE01 Published Date: 08-10-2020 |
Severity | HIGH |
CVE | CVE-2024-22257 , CVE-2024-22259 , CVE-2024-29025 |
CVSS Score | Base:8.1 Temporal:7.1 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/ |
CVSS Description | This vulnerability is remotely exploitable. It only requires that the vulnerable system be network connected. Exploitation of this vulnerability will have repeatable results and success. There are no specialized access conditions or extenuating circumstances to make the exploitation complex. This vulnerability can be carried out by an unauthorized attacker. A user must take some action before this vulnerability can be exploited. This vulnerability will not cause an escalation of privilege. There is a total loss of confidentiality, integrity. There is no impact on availability. No exploit code is available, or an exploit is completely theoretical. |
Solution | PTF: LU13788 |
Platform(s) | z/OS |
Broadcom customers may receive alerts and advisories by subscribing to Proactive Notifications.
If you missed any Mainframe Security Advisory alerts you can find all under Mainframe Security Advisories on the support portal.
To download a .CSV file that contains a consolidated list of security advisories affecting Broadcom mainframe products, click here for download instructions. You can use this file to easily search the CVE information.
Broadcom SECINT HOLDDATA is incorporated into our standard HOLDDATA file downloads. Therefore, it is not necessary to download any additional HOLDDATA files. Broadcom does recommend that you use SMP/E Receive Order to acquire HOLDDATA and maintenance.
Customers who require additional information about this notice may contact Broadcom Support at: support.broadcom.com.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." For an explanation of the CVSS scoring system and a description of each metric, please visit https://www.first.org/cvss/v3.
BROADCOM PROVIDES THE CVSS BASE AND TEMPORAL SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY IN THEIR SPECIFIC ENVIRONMENT. BROADCOM DOES NOT PROVIDE A CVSS ENVIRONMENT SCORE. THE CVSS ENVIRONMENT SCORE IS CUSTOMER ENVIRONMENT SPECIFIC AND WILL IMPACT THE OVERALL CVSS SCORE. CUSTOMERS SHOULD EVALUATE THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY AND CAN CALCULATE A CVSS ENVIRONMENT SCORE.
The CVSS score and all other information describing the security matter is Broadcom confidential and may be used by you for internal purposes only and may not be disclosed to any third party without Broadcom's prior written consent.