Home » IT safety: UNIX is underneath risk – a brand new safety gap in IBM AIX

IT safety: UNIX is underneath risk – a brand new safety gap in IBM AIX

by admin
IT safety: UNIX is underneath risk – a brand new safety gap in IBM AIX

There is a present safety alert for IBM AIX. You can learn right here what threatens IT safety in UNIX programs, how excessive the danger degree is and the way involved customers ought to behave.

Federal workplace for Security in Information Technology (BSI) has printed a safety advisory for IBM AIX on June 3, 2024. The safety vulnerability impacts the UNIX working system and the IBM AIX product.

The newest producer suggestions for updates, workarounds and safety patches for this vulnerability could be discovered right here: IBM Security Bulletin (As of June 3, 2024). Some helpful hyperlinks are listed later on this article.

Security Advisory for IBM AIX – Risk: Medium

Risk degree: 2 (reasonable)
CVSS Base Score: 5.9
CVSS interim rating: 5,2
Remote management: Ja

The Common Vulnerability Scoring System (CVSS) is used to evaluate the vulnerability of laptop programs. The CVSS normal makes it attainable to check potential or precise safety dangers based mostly on varied metrics with a purpose to prioritize countermeasures. The attributes “none”, “low”, “medium”, “excessive” and “extreme” are used to find out the severity ranges of vulnerability. The Base Score evaluates the necessities of an assault (together with authentication, complexity, privileges, consumer interplay) and its outcomes. Temporal scores additionally take into consideration adjustments over time within the threat scenario. The severity of the vulnerability talked about right here is rated as “reasonable” in accordance with CVSS with a base rating of 5.9.

IBM AIX Bug: Vulnerability Allows Information Disclosure

AIX is a Unix working system from IBM.

See also  Red Hat Enterprise Linux (libwebp) at risk: New vulnerability! Vulnerability allows Denial of Service

A distant, unknown attacker may exploit a vulnerability in IBM AIX to reveal info.

Vulnerabilities had been categorised utilizing the CVE (Common Vulnerability and Exposure) designation system for every serial quantity CVE-2024-0914.

Systems affected by the safety hole at a look

working system


Common steps to handle IT safety gaps

  1. Users of the affected apps ought to keep up-to-date. When safety holes are identified, producers are required to repair them shortly by creating a patch or workaround. If safety patches can be found, set up them instantly.
  2. For info, see the sources listed within the subsequent part. This usually accommodates extra details about the newest model of the software program in query and the provision of safety patches or efficiency suggestions.
  3. If you’ve got any additional questions or uncertainties, please contact your accountable administrator. IT safety managers ought to recurrently test the required sources to see if a brand new safety replace is accessible.

Manufacturer details about updates, patches and workarounds

Here you’ll discover some hyperlinks with details about bug reviews, safety fixes and workarounds.

IBM Security Bulletin vom 2024-06-03 (03.06.2024)
For extra info, see:

IBM Security Advisory vom 2024-06-03 (03.06.2024)
For extra info, see:

Version historical past of this safety alert

This is the primary model of this IT safety discover for IBM AIX. If updates are introduced, this doc will probably be up to date. You can see the adjustments made utilizing the model historical past under.

June 3, 2024 – First model

+++ Editorial word: This doc is predicated on present BSI knowledge and will probably be up to date in a data-driven method relying on the standing of the alert. We welcome suggestions and feedback at [email protected]. +++

See also  Brembo, artificial intelligence in the new hub in Silicon Valley

observe News.de you’re right here Facebook, Twitter, Pinterest once more YouTube? Here you’ll discover scorching information, present movies and a direct line to the editorial group.


You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy