IBM Cloud Pak For Business Automation 25.0.0, 24.0.1, and 24.0.0 could allow an attacker to access unauthorized content or perform unauthorized actions using man in the middle techniques due to improper access controls.
The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Cloud_pak_for_business_automation | Ibm | 24.0.0 (including) | 24.0.0 (including) |
| Cloud_pak_for_business_automation | Ibm | 24.0.0-interim_fix_001 (including) | 24.0.0-interim_fix_001 (including) |
| Cloud_pak_for_business_automation | Ibm | 24.0.0-interim_fix_002 (including) | 24.0.0-interim_fix_002 (including) |
| Cloud_pak_for_business_automation | Ibm | 24.0.0-interim_fix_003 (including) | 24.0.0-interim_fix_003 (including) |
| Cloud_pak_for_business_automation | Ibm | 24.0.0-interim_fix_004 (including) | 24.0.0-interim_fix_004 (including) |
| Cloud_pak_for_business_automation | Ibm | 24.0.1 (including) | 24.0.1 (including) |
| Cloud_pak_for_business_automation | Ibm | 24.0.1-interim_fix_001 (including) | 24.0.1-interim_fix_001 (including) |
| Cloud_pak_for_business_automation | Ibm | 24.0.1-interim_fix_002 (including) | 24.0.1-interim_fix_002 (including) |
| Cloud_pak_for_business_automation | Ibm | 24.0.1-interim_fix_004 (including) | 24.0.1-interim_fix_004 (including) |
| Cloud_pak_for_business_automation | Ibm | 25.0.0 (including) | 25.0.0 (including) |
| Cloud_pak_for_business_automation | Ibm | 25.0.0-interim_fix_001 (including) | 25.0.0-interim_fix_001 (including) |