{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<li>IBM Spectrum Protect Plus versions 10.1.x.x ant\u00e9rieures \u00e0 10.1.15.2</li> <li>IBM Storage Protect Operations Center versions 8.1.x.x ant\u00e9rieures \u00e0 8.1.20</li> ","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-28867","url":"https://www.cve.org/CVERecord?id=CVE-2023-28867"},{"name":"CVE-2023-1281","url":"https://www.cve.org/CVERecord?id=CVE-2023-1281"},{"name":"CVE-2023-3390","url":"https://www.cve.org/CVERecord?id=CVE-2023-3390"},{"name":"CVE-2023-2002","url":"https://www.cve.org/CVERecord?id=CVE-2023-2002"},{"name":"CVE-2022-0391","url":"https://www.cve.org/CVERecord?id=CVE-2022-0391"},{"name":"CVE-2022-4662","url":"https://www.cve.org/CVERecord?id=CVE-2022-4662"},{"name":"CVE-2023-3090","url":"https://www.cve.org/CVERecord?id=CVE-2023-3090"},{"name":"CVE-2023-2194","url":"https://www.cve.org/CVERecord?id=CVE-2023-2194"},{"name":"CVE-2021-3428","url":"https://www.cve.org/CVERecord?id=CVE-2021-3428"},{"name":"CVE-2023-1829","url":"https://www.cve.org/CVERecord?id=CVE-2023-1829"},{"name":"CVE-2023-24329","url":"https://www.cve.org/CVERecord?id=CVE-2023-24329"},{"name":"CVE-2023-1637","url":"https://www.cve.org/CVERecord?id=CVE-2023-1637"},{"name":"CVE-2023-2124","url":"https://www.cve.org/CVERecord?id=CVE-2023-2124"}],"links":[],"reference":"CERTFR-2023-AVI-0769","revisions":[{"description":"Version initiale","revision_date":"2023-09-21T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans <span\nclass=\"textit\">les produits IBM</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une\nex\u00e9cution de code arbitraire \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 IBM 7034265 du 19 septembre 2023","url":"https://www.ibm.com/support/pages/node/7034265"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 IBM 7034039 du 18 septembre 2023","url":"https://www.ibm.com/support/pages/node/7034039"}]}
