{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"DB2 Data Management Console versions 3.1.x post\u00e9rieures \u00e0 3.1.11 et ant\u00e9rieures \u00e0 3.1.13.1","product":{"name":"Db2","vendor":{"name":"IBM","scada":false}}},{"description":"Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP6","product":{"name":"Cognos Analytics","vendor":{"name":"IBM","scada":false}}},{"description":"Sterling Transformation Extender version 10.1.1.1 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67014","product":{"name":"Sterling","vendor":{"name":"IBM","scada":false}}},{"description":"Sterling Transformation Extender version 11.0.0.0 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67014","product":{"name":"Sterling","vendor":{"name":"IBM","scada":false}}},{"description":"Sterling Transformation Extender version 10.1.0.2 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67014","product":{"name":"Sterling","vendor":{"name":"IBM","scada":false}}},{"description":"Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4 FP1","product":{"name":"Cognos Analytics","vendor":{"name":"IBM","scada":false}}},{"description":"Sterling Transformation Extender version 10.1.2.1 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67014","product":{"name":"Sterling","vendor":{"name":"IBM","scada":false}}},{"description":"Informix Dynamic Server versions 14.10.x ant\u00e9rieures \u00e0 14.10.xC11W2","product":{"name":"Informix Dynamic Server","vendor":{"name":"IBM","scada":false}}},{"description":"Sterling Connect:Direct File Agent versions 1.4.0.x ant\u00e9rieures \u00e0 1.4.0.4","product":{"name":"Sterling Connect:Direct","vendor":{"name":"IBM","scada":false}}},{"description":"Sterling Transformation Extender versions 11.0.1.x ant\u00e9rieures \u00e0 11.0.1.1 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67016","product":{"name":"Sterling","vendor":{"name":"IBM","scada":false}}},{"description":"DB2 Data Management Console pour CPD versions ant\u00e9rieures \u00e0 5.1.2","product":{"name":"Db2","vendor":{"name":"IBM","scada":false}}},{"description":"Informix Dynamic Server versions 12.10.x ant\u00e9rieures \u00e0 12.10.xC16W2","product":{"name":"Informix Dynamic Server","vendor":{"name":"IBM","scada":false}}}],"affected_systems_content":"","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2024-21235","url":"https://www.cve.org/CVERecord?id=CVE-2024-21235"},{"name":"CVE-2025-4447","url":"https://www.cve.org/CVERecord?id=CVE-2025-4447"},{"name":"CVE-2024-21144","url":"https://www.cve.org/CVERecord?id=CVE-2024-21144"},{"name":"CVE-2021-43816","url":"https://www.cve.org/CVERecord?id=CVE-2021-43816"},{"name":"CVE-2024-21534","url":"https://www.cve.org/CVERecord?id=CVE-2024-21534"},{"name":"CVE-2025-24970","url":"https://www.cve.org/CVERecord?id=CVE-2025-24970"},{"name":"CVE-2022-32149","url":"https://www.cve.org/CVERecord?id=CVE-2022-32149"},{"name":"CVE-2024-10917","url":"https://www.cve.org/CVERecord?id=CVE-2024-10917"},{"name":"CVE-2025-1302","url":"https://www.cve.org/CVERecord?id=CVE-2025-1302"},{"name":"CVE-2025-27152","url":"https://www.cve.org/CVERecord?id=CVE-2025-27152"},{"name":"CVE-2025-21587","url":"https://www.cve.org/CVERecord?id=CVE-2025-21587"},{"name":"CVE-2024-7254","url":"https://www.cve.org/CVERecord?id=CVE-2024-7254"},{"name":"CVE-2024-52900","url":"https://www.cve.org/CVERecord?id=CVE-2024-52900"},{"name":"CVE-2024-47535","url":"https://www.cve.org/CVERecord?id=CVE-2024-47535"},{"name":"CVE-2025-30698","url":"https://www.cve.org/CVERecord?id=CVE-2025-30698"},{"name":"CVE-2024-27289","url":"https://www.cve.org/CVERecord?id=CVE-2024-27289"},{"name":"CVE-2022-41721","url":"https://www.cve.org/CVERecord?id=CVE-2022-41721"},{"name":"CVE-2025-25193","url":"https://www.cve.org/CVERecord?id=CVE-2025-25193"},{"name":"CVE-2024-21145","url":"https://www.cve.org/CVERecord?id=CVE-2024-21145"},{"name":"CVE-2024-4741","url":"https://www.cve.org/CVERecord?id=CVE-2024-4741"},{"name":"CVE-2025-2900","url":"https://www.cve.org/CVERecord?id=CVE-2025-2900"},{"name":"CVE-2025-1991","url":"https://www.cve.org/CVERecord?id=CVE-2025-1991"},{"name":"CVE-2022-23648","url":"https://www.cve.org/CVERecord?id=CVE-2022-23648"},{"name":"CVE-2023-39325","url":"https://www.cve.org/CVERecord?id=CVE-2023-39325"},{"name":"CVE-2024-21131","url":"https://www.cve.org/CVERecord?id=CVE-2024-21131"},{"name":"CVE-2024-21210","url":"https://www.cve.org/CVERecord?id=CVE-2024-21210"},{"name":"CVE-2024-2511","url":"https://www.cve.org/CVERecord?id=CVE-2024-2511"},{"name":"CVE-2022-21698","url":"https://www.cve.org/CVERecord?id=CVE-2022-21698"},{"name":"CVE-2024-21217","url":"https://www.cve.org/CVERecord?id=CVE-2024-21217"},{"name":"CVE-2024-27267","url":"https://www.cve.org/CVERecord?id=CVE-2024-27267"},{"name":"CVE-2022-27664","url":"https://www.cve.org/CVERecord?id=CVE-2022-27664"},{"name":"CVE-2024-21208","url":"https://www.cve.org/CVERecord?id=CVE-2024-21208"}],"links":[],"reference":"CERTFR-2025-AVI-0562","revisions":[{"description":"Version initiale","revision_date":"2025-07-04T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"},{"description":"Injection SQL (SQLi)"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM","vendor_advisories":[{"published_at":"2025-06-28","title":"Bulletin de s\u00e9curit\u00e9 IBM 7238455","url":"https://www.ibm.com/support/pages/node/7238455"},{"published_at":"2025-07-02","title":"Bulletin de s\u00e9curit\u00e9 IBM 7238755","url":"https://www.ibm.com/support/pages/node/7238755"},{"published_at":"2025-07-03","title":"Bulletin de s\u00e9curit\u00e9 IBM 7238833","url":"https://www.ibm.com/support/pages/node/7238833"},{"published_at":"2025-07-03","title":"Bulletin de s\u00e9curit\u00e9 IBM 7238824","url":"https://www.ibm.com/support/pages/node/7238824"},{"published_at":"2025-07-03","title":"Bulletin de s\u00e9curit\u00e9 IBM 7238831","url":"https://www.ibm.com/support/pages/node/7238831"},{"published_at":"2025-07-03","title":"Bulletin de s\u00e9curit\u00e9 IBM 7238826","url":"https://www.ibm.com/support/pages/node/7238826"},{"published_at":"2025-07-03","title":"Bulletin de s\u00e9curit\u00e9 IBM 7238830","url":"https://www.ibm.com/support/pages/node/7238830"},{"published_at":"2025-07-02","title":"Bulletin de s\u00e9curit\u00e9 IBM 7238753","url":"https://www.ibm.com/support/pages/node/7238753"},{"published_at":"2025-06-27","title":"Bulletin de s\u00e9curit\u00e9 IBM 7238163","url":"https://www.ibm.com/support/pages/node/7238163"}]}
