Upgrade OPS/MVS RESTAPI to Zowe SDK v2.8.3

OPS/MVS Event Management & Automation

0 more products

24445

04 June 2024

04 June 2024

OPEN

HIGH

8.1

CVE-2024-22259

Broadcom Mainframe Software is alerting customers to a vulnerability in OPS/MVS (RESTAPI)

 

Product Name OPS/MVS 14.0
Affected component(s) FMID:CCLXE01
Version PE was Introduced FMID in Error: CCLXE01    Published Date: 08-10-2020
Severity HIGH
CVE CVE-2024-22257 CVE-2024-22259 CVE-2024-29025
CVSS Score Base:8.1 Temporal:7.1
CVSS Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
CVSS Description This vulnerability is remotely exploitable. It only requires that the vulnerable system be network connected. Exploitation of this vulnerability will have repeatable results and success. There are no specialized access conditions or extenuating circumstances to make the exploitation complex. This vulnerability can be carried out by an unauthorized attacker. A user must take some action before this vulnerability can be exploited. This vulnerability will not cause an escalation of privilege. There is a total loss of confidentiality, integrity. There is no impact on availability. No exploit code is available, or an exploit is completely theoretical.
Solution PTF: LU13788
Platform(s) z/OS

Broadcom customers may receive alerts and advisories by subscribing to Proactive Notifications.

If you missed any Mainframe Security Advisory alerts you can find all under Mainframe Security Advisories on the support portal.

To download a .CSV file that contains a consolidated list of security advisories affecting Broadcom mainframe products, click here for download instructions. You can use this file to easily search the CVE information.

Broadcom SECINT HOLDDATA is incorporated into our standard HOLDDATA file downloads. Therefore, it is not necessary to download any additional HOLDDATA files. Broadcom does recommend that you use SMP/E Receive Order to acquire HOLDDATA and maintenance.

Customers who require additional information about this notice may contact Broadcom Support at: support.broadcom.com.

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." For an explanation of the CVSS scoring system and a description of each metric, please visit https://www.first.org/cvss/v3.1/specification-document

BROADCOM PROVIDES THE CVSS BASE AND TEMPORAL SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY IN THEIR SPECIFIC ENVIRONMENT.  BROADCOM DOES NOT PROVIDE A CVSS ENVIRONMENT SCORE. THE CVSS ENVIRONMENT SCORE IS CUSTOMER ENVIRONMENT SPECIFIC AND WILL IMPACT THE OVERALL CVSS SCORE. CUSTOMERS SHOULD EVALUATE THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY AND CAN CALCULATE A CVSS ENVIRONMENT SCORE.

The CVSS score and all other information describing the security matter is Broadcom confidential and may be used by you for internal purposes only and may not be disclosed to any third party without Broadcom's prior written consent.