CVE-2024-41783

IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow a privileged user to inject commands into the underlying operating system due to improper validation of a specified type of input.
References
Link Resource
https://www.ibm.com/support/pages/node/7176189 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:ibm:sterling_secure_proxy:*:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:6.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:6.2.0.0:*:*:*:*:*:*:*
OR cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*
cpe:2.3:o:ibm:linux_on_ibm_z:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

25 Jul 2025, 20:38

Type Values Removed Values Added
First Time Ibm aix
Linux
Microsoft
Ibm
Ibm sterling Secure Proxy
Microsoft windows
Ibm linux On Ibm Z
Linux linux Kernel
References () https://www.ibm.com/support/pages/node/7176189 - () https://www.ibm.com/support/pages/node/7176189 - Vendor Advisory
CWE CWE-77
CPE cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:ibm:linux_on_ibm_z:-:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:6.2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:*:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:6.1.0.0:*:*:*:*:*:*:*
Summary
  • (es) IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0 y 6.2.0.0 podrían permitir que un usuario privilegiado inyecte comandos en el sistema operativo subyacente sistema debido a una validación incorrecta de un tipo específico de entrada.

19 Jan 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-19 15:15

Updated : 2025-07-25 20:38


NVD link : CVE-2024-41783

Mitre link : CVE-2024-41783

CVE.ORG link : CVE-2024-41783


JSON object : View

Products Affected

microsoft

  • windows

ibm

  • linux_on_ibm_z
  • sterling_secure_proxy
  • aix

linux

  • linux_kernel
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')