CVE-2022-38712
IBM WebSphere App Server vulnerability analysis and mitigation

Overview

IBM WebSphere Application Server versions 7.0, 8.0, 8.5, and 9.0 were identified with a vulnerability (CVE-2022-38712) that could allow man-in-the-middle attackers to conduct SOAPAction spoofing to execute unwanted or unauthorized operations. The vulnerability was discovered and assigned on August 23, 2022, with IBM publishing the security bulletin on October 17, 2022 (IBM Security).

Technical details

The vulnerability received a CVSS Base score of 5.9 with a vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N, indicating a network-attackable vulnerability with high attack complexity, no privileges required, no user interaction needed, and potential for high impact on integrity. The vulnerability specifically affects the Web services component of the WebSphere Application Server when processing JAX-WS Web Services requests (IBM Security).

Impact

If exploited, this vulnerability could allow attackers to execute unauthorized or unwanted operations through SOAPAction spoofing attacks. The CVSS scoring indicates that while there is no impact on confidentiality or availability, there is a high potential impact on the integrity of the system (IBM Security).

Mitigation and workarounds

IBM recommends addressing the vulnerability by applying the interim fix PH49111 or upgrading to specific fix pack levels. For version 9.0.0.0 through 9.0.5.13, users should upgrade to Fix Pack 9.0.5.14 or later. Version 8.5.0.0 through 8.5.5.22 users should upgrade to Fix Pack 8.5.5.23 or later. Version 8.0.0.0 through 8.0.0.15 users should upgrade to 8.0.0.15 and apply Interim Fix PH49111. Version 7.0.0.0 through 7.0.0.45 users should upgrade to 7.0.0.45 and apply Interim Fix PH49111. No workarounds are available for this vulnerability (IBM Security).

Additional resources


SourceThis report was generated using AI

Related IBM WebSphere App Server vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-27554CRITICAL9.1
  • IBM WebSphere App ServerIBM WebSphere App Server
  • cpe:2.3:a:ibm:websphere_application_server
NoYesMay 11, 2023
CVE-2024-22353HIGH7.5
  • IBM WebSphere App ServerIBM WebSphere App Server
  • cpe:2.3:a:ibm:websphere_application_server
NoNoMar 31, 2024
CVE-2023-38737HIGH7.5
  • IBM WebSphere App ServerIBM WebSphere App Server
  • cpe:2.3:a:ibm:websphere_application_server
NoNoAug 16, 2023
CVE-2023-50313MEDIUM6.5
  • IBM WebSphere App ServerIBM WebSphere App Server
  • cpe:2.3:a:ibm:websphere_application_server
NoYesApr 02, 2024
CVE-2023-35890MEDIUM5.5
  • IBM WebSphere App ServerIBM WebSphere App Server
  • cpe:2.3:a:ibm:websphere_application_server
NoYesJul 07, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management