Skip to main content

CVE-2022-34313: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in IBM CICS TX

Medium
VulnerabilityCVE-2022-34313cvecve-2022-34313cwe-200
Published: Mon Nov 14 2022 (11/14/2022, 17:05:53 UTC)
Source: CVE
Vendor/Project: IBM
Product: CICS TX

Description

IBM CICS TX 11.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. X-Force ID: 229449.

AI-Powered Analysis

AILast updated: 06/25/2025, 06:19:37 UTC

Technical Analysis

CVE-2022-34313 is a medium-severity vulnerability affecting IBM CICS Transaction Server (CICS TX) version 11.1. The issue arises because the product does not set the 'secure' attribute on authorization tokens or session cookies. The 'secure' attribute instructs browsers to only send cookies over HTTPS connections, preventing them from being transmitted over unencrypted HTTP. Without this attribute, an attacker can trick a user into visiting an HTTP (non-secure) link, either by sending a crafted link directly or by embedding it in a website the user visits. When the user’s browser sends the cookie over HTTP, the cookie can be intercepted by an attacker monitoring the network traffic (e.g., via man-in-the-middle attacks or on unsecured Wi-Fi networks). This exposure can lead to unauthorized access if the stolen cookie is used to impersonate the user or hijack their session. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction (clicking or visiting a malicious HTTP link). The impact is limited to confidentiality loss of session tokens; integrity and availability are not affected. No known exploits have been reported in the wild, and no patches have been explicitly linked in the provided data. The vulnerability primarily affects environments where IBM CICS TX 11.1 is deployed and where session cookies are used for authorization. Given the nature of the vulnerability, it is a session management weakness that can be mitigated by proper cookie attribute configuration and enforcing HTTPS usage.

Potential Impact

For European organizations using IBM CICS TX 11.1, this vulnerability poses a risk of session token theft leading to unauthorized access to critical transaction processing systems. CICS TX is widely used in large enterprises, especially in banking, insurance, and government sectors, which are prevalent in Europe. Exposure of session cookies can allow attackers to impersonate legitimate users, potentially accessing sensitive financial or personal data. Although the vulnerability does not directly affect system integrity or availability, unauthorized access can lead to data breaches, compliance violations (e.g., GDPR), and reputational damage. The risk is heightened in environments where users access systems over insecure networks or where HTTPS enforcement is lax. Given the strategic importance of CICS TX in European financial institutions and public sector organizations, exploitation could disrupt critical business processes or lead to data leakage. However, the requirement for user interaction and the absence of known exploits reduce the immediate threat level. Still, the vulnerability should be addressed promptly to maintain strong security postures and regulatory compliance.

Mitigation Recommendations

1. Immediately configure IBM CICS TX 11.1 to set the 'secure' attribute on all authorization tokens and session cookies to ensure they are only transmitted over HTTPS connections. 2. Enforce strict HTTPS usage across all web interfaces interacting with CICS TX, including redirecting all HTTP requests to HTTPS and disabling HTTP access where possible. 3. Implement HTTP Strict Transport Security (HSTS) headers to instruct browsers to always use HTTPS for the domain, preventing downgrade attacks. 4. Conduct user awareness training to avoid clicking on suspicious HTTP links and to recognize phishing attempts that might exploit this vulnerability. 5. Monitor network traffic for unencrypted cookie transmissions and anomalous session activities that could indicate token theft or misuse. 6. Review and update web application firewalls (WAFs) and intrusion detection/prevention systems (IDS/IPS) to detect and block attempts to exploit this vulnerability. 7. Plan and apply any official patches or updates from IBM once available, and verify secure cookie handling in future product versions. 8. Audit all applications and middleware interacting with CICS TX to ensure consistent secure cookie practices and HTTPS enforcement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2022-06-22T15:44:19.311Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee261

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 6/25/2025, 6:19:37 AM

Last updated: 8/17/2025, 4:11:11 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats