IBM App Connect Enterprise Certified Container 7.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, and 12.7 Pods do not restrict network egress for Pods that are used for internal infrastructure.
References
Link | Resource |
---|---|
https://www.ibm.com/support/pages/node/7181916 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
13 Aug 2025, 17:50
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat openshift
Ibm app Connect Enterprise Certified Container Redhat Ibm |
|
CPE | cpe:2.3:a:ibm:app_connect_enterprise_certified_container:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:openshift:-:*:*:*:*:*:*:* |
|
References | () https://www.ibm.com/support/pages/node/7181916 - Vendor Advisory |
18 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE |
30 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-862 |
30 Jan 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-30 12:15
Updated : 2025-08-13 17:50
NVD link : CVE-2022-43916
Mitre link : CVE-2022-43916
CVE.ORG link : CVE-2022-43916
JSON object : View
Products Affected
redhat
- openshift
ibm
- app_connect_enterprise_certified_container
CWE
CWE-923
Improper Restriction of Communication Channel to Intended Endpoints