Vulnerability Details : CVE-2015-7441
Remote Artifact Loader (RAL) in IBM WebSphere Process Server 7 and Business Process Manager Advanced 7.5 through 7.5.1.2, 8.0 through 8.0.1.3, 8.5.0 through 8.5.0.2, 8.5.5 through 8.5.5.0, and 8.5.6 through 8.5.6.2 does not properly use SSL for its HTTPS connection, which allows remote authenticated users to obtain sensitive information or modify data via unspecified vectors.
Products affected by CVE-2015-7441
- cpe:2.3:a:ibm:websphere_process_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.6.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-7441
0.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-7441
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:N |
6.8
|
4.9
|
NIST | |
6.8
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N |
1.6
|
5.2
|
NIST |
CWE ids for CVE-2015-7441
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-7441
-
http://www.securitytracker.com/id/1034531
IBM WebSphere Process Server Flaw in Remote Artifact Loader Lets Remote Users Access and Modify Data on the Target System - SecurityTracker
-
http://www-01.ibm.com/support/docview.wss?uid=swg1JR54760
IBM notice: The page you requested cannot be displayedVendor Advisory
-
https://www-01.ibm.com/support/docview.wss?uid=swg21971968
IBM Security Bulletin: Incorrect SSL/TLS handling in Remote Artifact Loader in IBM Business Process Manager Advanced and WebSphere Process Server
-
http://www.securitytracker.com/id/1034532
IBM Business Process Manager Advanced Flaw in Remote Artifact Loader Lets Remote Users Access and Modify Data on the Target System - SecurityTracker
Jump to