CNVD-2025-12588

Vulnerability from cnvd - Published: 2025-06-10
VLAI Severity ?
Title
IBM App Connect Enterprise加密问题漏洞
Description
IBM App Connect Enterprise是美国国际商业机器(IBM)公司的一个操作系统。IBM App Connect Enterprise将现有业界信任的IBM Integration Bus技术与IBM App Connect Professional以及新的云本机技术进行了组合,提供一个可满足现代数字企业全面集成需求的平台。 IBM App Connect Enterprise存在加密问题漏洞,该漏洞源于加密算法强度不足,攻击者可利用该漏洞导致数据泄露。
Severity
Patch Name
IBM App Connect Enterprise加密问题漏洞的补丁
Patch Description
IBM App Connect Enterprise是美国国际商业机器(IBM)公司的一个操作系统。IBM App Connect Enterprise将现有业界信任的IBM Integration Bus技术与IBM App Connect Professional以及新的云本机技术进行了组合,提供一个可满足现代数字企业全面集成需求的平台。 IBM App Connect Enterprise存在加密问题漏洞,该漏洞源于加密算法强度不足,攻击者可利用该漏洞导致数据泄露。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://www.ibm.com/support/pages/node/7233054

Reference
https://nvd.nist.gov/vuln/detail/CVE-2025-1993
Impacted products
Name
IBM IBM App Connect Enterprise >=8.1,<=12.10
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2025-1993",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-1993"
    }
  },
  "description": "IBM App Connect Enterprise\u662f\u7f8e\u56fd\u56fd\u9645\u5546\u4e1a\u673a\u5668\uff08IBM\uff09\u516c\u53f8\u7684\u4e00\u4e2a\u64cd\u4f5c\u7cfb\u7edf\u3002IBM App Connect Enterprise\u5c06\u73b0\u6709\u4e1a\u754c\u4fe1\u4efb\u7684IBM Integration Bus\u6280\u672f\u4e0eIBM App Connect Professional\u4ee5\u53ca\u65b0\u7684\u4e91\u672c\u673a\u6280\u672f\u8fdb\u884c\u4e86\u7ec4\u5408\uff0c\u63d0\u4f9b\u4e00\u4e2a\u53ef\u6ee1\u8db3\u73b0\u4ee3\u6570\u5b57\u4f01\u4e1a\u5168\u9762\u96c6\u6210\u9700\u6c42\u7684\u5e73\u53f0\u3002\n\nIBM App Connect Enterprise\u5b58\u5728\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u52a0\u5bc6\u7b97\u6cd5\u5f3a\u5ea6\u4e0d\u8db3\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u6570\u636e\u6cc4\u9732\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.ibm.com/support/pages/node/7233054",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2025-12588",
  "openTime": "2025-06-10",
  "patchDescription": "IBM App Connect Enterprise\u662f\u7f8e\u56fd\u56fd\u9645\u5546\u4e1a\u673a\u5668\uff08IBM\uff09\u516c\u53f8\u7684\u4e00\u4e2a\u64cd\u4f5c\u7cfb\u7edf\u3002IBM App Connect Enterprise\u5c06\u73b0\u6709\u4e1a\u754c\u4fe1\u4efb\u7684IBM Integration Bus\u6280\u672f\u4e0eIBM App Connect Professional\u4ee5\u53ca\u65b0\u7684\u4e91\u672c\u673a\u6280\u672f\u8fdb\u884c\u4e86\u7ec4\u5408\uff0c\u63d0\u4f9b\u4e00\u4e2a\u53ef\u6ee1\u8db3\u73b0\u4ee3\u6570\u5b57\u4f01\u4e1a\u5168\u9762\u96c6\u6210\u9700\u6c42\u7684\u5e73\u53f0\u3002\r\n\r\nIBM App Connect Enterprise\u5b58\u5728\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u52a0\u5bc6\u7b97\u6cd5\u5f3a\u5ea6\u4e0d\u8db3\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u6570\u636e\u6cc4\u9732\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "IBM App Connect Enterprise\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "IBM IBM App Connect Enterprise \u003e=8.1\uff0c\u003c=12.10"
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2025-1993",
  "serverity": "\u4e2d",
  "submitTime": "2025-05-20",
  "title": "IBM App Connect Enterprise\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…