Skip to main content

CVE-2022-34311: CWE-522 Insufficiently Protected Credentials in IBM CICS TX Standard

Medium
VulnerabilityCVE-2022-34311cvecve-2022-34311cwe-522
Published: Mon Feb 12 2024 (02/12/2024, 18:12:26 UTC)
Source: CVE
Vendor/Project: IBM
Product: CICS TX Standard

Description

IBM CICS TX Standard and Advanced 11.1 could allow a user with physical access to the web browser to gain access to the user's session due to insufficiently protected credentials. IBM X-Force ID: 229446.

AI-Powered Analysis

AILast updated: 07/05/2025, 17:12:22 UTC

Technical Analysis

CVE-2022-34311 is a vulnerability identified in IBM CICS TX Standard and Advanced version 11.1, classified under CWE-522, which pertains to insufficiently protected credentials. This vulnerability arises because the credentials used in the web browser session are not adequately safeguarded, allowing a user with physical access to the device running the web browser to potentially hijack or gain unauthorized access to an active session. The vulnerability does not require prior authentication or user interaction, but it does require physical access to the system where the session is active. The CVSS 3.1 base score is 4.3 (medium severity), reflecting limited network attack vector (physical access required), low complexity of attack, and impacts on confidentiality, integrity, and availability, albeit at a low level. The vulnerability could allow an attacker to intercept or reuse session credentials, leading to unauthorized access to the CICS TX environment, which is critical for transaction processing in enterprise environments. No known exploits are currently reported in the wild, and no patches have been explicitly linked in the provided data, indicating that mitigation may rely on operational controls or forthcoming updates from IBM. The vulnerability is particularly relevant in environments where shared or publicly accessible terminals are used, or where physical security controls are weak, as an attacker could exploit the session credentials stored or cached in the browser to impersonate the legitimate user.

Potential Impact

For European organizations, especially those in sectors relying on IBM CICS TX for transaction processing such as banking, insurance, government, and large enterprises, this vulnerability poses a risk of unauthorized access to sensitive transactional data and systems. The impact includes potential data leakage, unauthorized transaction manipulation, and disruption of critical business processes. Given the requirement for physical access, the threat is more pronounced in environments with shared workstations, remote offices, or insufficient physical security controls. The compromise of session credentials could lead to lateral movement within the enterprise network, increasing the risk of broader compromise. Additionally, regulatory frameworks such as GDPR impose strict requirements on data protection; unauthorized access incidents could lead to compliance violations and financial penalties. The medium severity score suggests that while the vulnerability is not trivially exploitable remotely, the consequences of exploitation in sensitive environments could be significant.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement strict physical security controls to prevent unauthorized access to devices running IBM CICS TX web sessions. This includes enforcing workstation lock policies, using screen savers with password protection, and restricting access to shared terminals. Organizations should also consider session timeout configurations to minimize the window of opportunity for session hijacking. Employing multi-factor authentication (MFA) for access to CICS TX environments can reduce the risk of unauthorized access even if session credentials are compromised. Additionally, organizations should monitor for unusual session activity and implement endpoint security solutions that can detect and prevent credential theft or session hijacking attempts. IBM should be engaged to provide patches or updates addressing this vulnerability, and organizations should plan to apply such patches promptly once available. Training users on the risks of leaving sessions unattended and the importance of logging out can further reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2022-06-22T15:44:19.310Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbda107

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 5:12:22 PM

Last updated: 7/26/2025, 11:10:58 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats