Vulnerability Details : CVE-2022-42435
IBM Business Automation Workflow 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, and 22.0.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 238054.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2022-42435
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:22.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:22.0.1:if001:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:22.0.1:if002:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:22.0.1:if003:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:22.0.1:if004:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:22.0.1:if005:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if001:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if002:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if003:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if004:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if005:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if006:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if007:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if008:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if009:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if010:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if011:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if012:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if013:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if014:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if015:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:if001:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:if002:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:if003:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:if004:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:if005:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:if006:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:if007:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:if008:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:if009:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:if010:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:if011:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.2:if012:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.1:if001:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.1:if002:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.1:if003:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.1:if004:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.1:if005:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.1:if006:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:21.0.1:if007:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:20.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:20.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:19.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:19.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:19.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:18.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:18.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:18.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_automation_workflow:20.0.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-42435
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-42435
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
IBM Corporation |
CWE ids for CVE-2022-42435
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: psirt@us.ibm.com (Primary)
References for CVE-2022-42435
-
https://www.ibm.com/support/pages/node/6852217
Security Bulletin: Security vulnerabilities are addressed with IBM Cloud Pak for Business Automation iFixes for December 2022Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/238054
VDB Entry;Vendor Advisory
Jump to