IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow a privileged user to inject commands into the underlying operating system due to improper validation of a specified type of input.
2025-01-19T15:15:21.020
2025-07-25T20:38:34.317
Analyzed
CVSSv3.1: 9.1 (CRITICAL)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ibm | sterling_secure_proxy | < 6.0.3.1 | Yes |
Application | ibm | sterling_secure_proxy | 6.1.0.0 | Yes |
Application | ibm | sterling_secure_proxy | 6.2.0.0 | Yes |
Operating System | ibm | aix | - | No |
Operating System | ibm | linux_on_ibm_z | - | No |
Operating System | linux | linux_kernel | - | No |
Operating System | microsoft | windows | - | No |