IBM Robotic Process Automation versions 21.0.0, 21.0.1, and 21.0.2 are affected by CVE-2022-22412, allowing unauthorized users to obtain login access tokens, posing medium severity risk.
IBM Robotic Process Automation versions 21.0.0, 21.0.1, and 21.0.2 have a vulnerability where a user with access to the local host can obtain a login access token.
Understanding CVE-2022-22412
This CVE affects IBM's Robotic Process Automation software versions 21.0.0, 21.0.1, and 21.0.2, allowing unauthorized users to retrieve login access tokens.
What is CVE-2022-22412?
IBM Robotic Process Automation versions 21.0.0, 21.0.1, and 21.0.2 are susceptible to an issue where an attacker with local host access can extract a login access token, compromising system security.
The Impact of CVE-2022-22412
The vulnerability poses a medium severity risk with high confidentiality impact. An attacker could exploit this to gain sensitive login access tokens.
Technical Details of CVE-2022-22412
The vulnerability has a CVSS v3.0 base score of 4.2, with high attack complexity and physical vector. The attack requires no privileges and has unproven exploit code maturity.
Vulnerability Description
The flaw allows unauthorized users to acquire login access tokens by having access to the local host, potentially leading to sensitive data exposure.
Affected Systems and Versions
IBM Robotic Process Automation versions 21.0.0, 21.0.1, and 21.0.2 are impacted by this vulnerability.
Exploitation Mechanism
By exploiting this issue, an attacker with access to the local host can obtain login access tokens, jeopardizing system security.
Mitigation and Prevention
To safeguard your systems against CVE-2022-22412:
Immediate Steps to Take
Ensure that only trusted users have access to the local host where the affected software is installed.
Long-Term Security Practices
Regularly monitor and audit user access rights and permissions to prevent unauthorized actions.
Patching and Updates
Apply the official fix provided by IBM for versions 21.0.0, 21.0.1, and 21.0.2 to mitigate the vulnerability.