Skip to main content

CVE-2022-35279: Information Disclosure in IBM Business Automation Workflow

Medium
VulnerabilityCVE-2022-35279cvecve-2022-35279
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: IBM Business Automation Workflow

Description

"IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, 19.0.0.2, 19.0.0.3, 20.0.0.1, 20.0.0.2, 21.0.2, 21.0.3, and 22.0.1 could disclose sensitive version information to authenticated users which could be used in further attacks against the system. IBM X-Force ID: 230537."

AI-Powered Analysis

AILast updated: 06/26/2025, 04:12:53 UTC

Technical Analysis

CVE-2022-35279 is an information disclosure vulnerability identified in multiple versions of IBM Business Automation Workflow, specifically versions 18.0.0.0 through 22.0.1. This vulnerability allows authenticated users to obtain sensitive version information about the IBM Business Automation Workflow system. The disclosed information can include detailed version identifiers that could assist an attacker in crafting targeted attacks or exploiting other vulnerabilities specific to the disclosed versions. The vulnerability is classified under CWE-312, which relates to the improper protection of sensitive information. The CVSS 3.1 base score is 4.3 (medium severity), with the vector indicating that the attack requires network access (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts confidentiality only (C:L), without affecting integrity or availability. No known exploits are reported in the wild, and no patches are explicitly linked in the provided data, suggesting that remediation may require applying vendor updates or configuration changes once available. The vulnerability's impact is limited to information disclosure, but the exposed version details can facilitate further exploitation by revealing the exact software build and patch level, which is valuable intelligence for attackers planning advanced persistent threats or targeted intrusions.

Potential Impact

For European organizations using IBM Business Automation Workflow, this vulnerability poses a moderate risk primarily through the exposure of sensitive version information to authenticated users. While it does not directly compromise data integrity or availability, the disclosed information can aid attackers in identifying exploitable weaknesses in the specific software versions deployed. This can increase the likelihood of successful follow-on attacks, such as privilege escalation, code execution, or lateral movement within the network. Organizations in sectors with high reliance on business process automation—such as finance, manufacturing, and government—may face increased risk due to the critical nature of workflows managed by this software. Additionally, since the vulnerability requires authenticated access, insider threats or compromised credentials could be leveraged to exploit this weakness. The information disclosure could also assist in reconnaissance efforts by external threat actors targeting European enterprises, potentially leading to more sophisticated and damaging attacks.

Mitigation Recommendations

To mitigate CVE-2022-35279, European organizations should first ensure strict access controls to IBM Business Automation Workflow environments, limiting authenticated user privileges to the minimum necessary. Implement robust identity and access management (IAM) policies, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Monitor and audit user activities within the workflow system to detect unusual access patterns that may indicate exploitation attempts. Although no direct patches are linked in the provided data, organizations should regularly check IBM’s official security advisories and apply any available updates or hotfixes addressing this vulnerability. Additionally, consider network segmentation to isolate workflow management systems from broader enterprise networks, reducing exposure. Employ application-layer monitoring and anomaly detection tools to identify attempts to gather version information or perform reconnaissance. Finally, conduct regular security awareness training to minimize insider threats and ensure that users understand the importance of safeguarding credentials and reporting suspicious activities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2022-07-06T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb901

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:12:53 AM

Last updated: 8/8/2025, 2:44:35 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats