Common Components and Services for z/OS 15.0 Vulnerability in CCS Apache Tomcat

COMMON SERVICES FOR Z/OS

0 more products

24870

06 August 2024

06 August 2024

OPEN

HIGH

7.5

CVE-2024-34750

Broadcom Mainframe Software is alerting customers to a vulnerability in Common Components and Services for z/OS 15.0.

 

Product Name Common Components and Services for z/OS 15.0
Affected component(s) FMID:CFF6F00 CCS Apache Tomcat upgraded from 9.0.87 to 9.0.91
Version PE was Introduced FMID in Error: CFF6F00    Published Date: 01-01-2019
Severity HIGH
CVE CVE-2024-34750
CVSS Score Base:7.5 Temporal:6.5
CVSS Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
CVSS Description This vulnerability is remotely exploitable. It only requires that the vulnerable system be network connected. Exploitation of this vulnerability will have repeatable results and success. There are no specialized access conditions or extenuating circumstances to make the exploitation complex. This vulnerability can be carried out by an unauthorized attacker. Exploitation of the vulnerability does not require any user interaction. This vulnerability will not cause an escalation of privilege. There is no impact on confidentiality, integrity. There is a total loss of availability. No exploit code is available, or an exploit is completely theoretical.
Solution LU07474
Platform(s) z/OS

 

Broadcom customers may receive alerts and advisories by subscribing to Proactive Notifications.

If you missed any Mainframe Security Advisory alerts you can find all under Mainframe Security Advisories on the customer support portal.

To download a .CSV file that contains a consolidated list of security advisories affecting Broadcom mainframe products, click here for download instructions. You can use this file to easily search the CVE information.

Broadcom SECINT HOLDDATA is incorporated into our standard HOLDDATA file downloads. Therefore, it is not necessary to download any additional HOLDDATA files. Broadcom recommends that you use SMP/E Receive Order to acquire HOLDDATA and maintenance.

Customers who require additional information about this notice may contact Broadcom Support at: Support.Broadcom.com.

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." For an explanation of the CVSS scoring system and a description of each metric, please visit https://www.first.org/cvss/v3.1/specification-document

BROADCOM PROVIDES THE CVSS BASE AND TEMPORAL SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY IN THEIR SPECIFIC ENVIRONMENT. BROADCOM DOES NOT PROVIDE A CVSS ENVIRONMENT SCORE. THE CVSS ENVIRONMENT SCORE IS CUSTOMER ENVIRONMENT SPECIFIC AND WILL IMPACT THE OVERALL CVSS SCORE. CUSTOMERS SHOULD EVALUATE THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY AND CAN CALCULATE A CVSS ENVIRONMENT SCORE.

The CVSS score and all other information describing the security matter is Broadcom confidential and may be used by you for internal purposes only and may not be disclosed to any third party without Broadcom's prior written consent.