CVE-2020-4682
Summary
| CVE | CVE-2020-4682 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-01-28 13:15:00 UTC |
| Updated | 2021-02-02 17:35:00 UTC |
| Description | IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Application |
Ibm |
Mq |
8.0.0.0 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.1 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.10 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.11 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.12 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.13 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.14 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.15 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.2 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.3 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.4 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.5 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.6 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.7 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.8 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.9 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.0 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.1 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.10 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.2 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.3 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.4 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.5 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.6 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.7 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.8 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.9 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.0 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.1 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.2 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.3 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.4 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.5 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.6 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.2.0.0 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.2.1.0 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.0 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.1 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.10 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.11 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.12 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.13 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.14 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.15 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.2 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.3 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.4 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.5 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.6 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.7 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.8 |
All |
All |
All |
| Application |
Ibm |
Mq |
8.0.0.9 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.0 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.1 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.10 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.2 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.3 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.4 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.5 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.6 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.7 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.8 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.0.0.9 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.0 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.1 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.2 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.3 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.4 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.5 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.1.0.6 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.2.0.0 |
All |
All |
All |
| Application |
Ibm |
Mq |
9.2.1.0 |
All |
All |
All |
| Application |
Ibm |
Mq Appliance |
9.2.0.0 |
All |
All |
All |
| Application |
Ibm |
Mq Appliance |
9.2.0.0 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.0 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.1 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.2 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.3 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.4 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.5 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.6 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.7 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.8 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.9 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.0 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.1 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.2 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.3 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.4 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.5 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.6 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.7 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.8 |
All |
All |
All |
| Application |
Ibm |
Websphere Mq |
7.5.0.9 |
All |
All |
All |
References
| Reference | Source | Link | Tags |
|---|
| IBM X-Force Exchange |
XF |
exchange.xforce.ibmcloud.com |
VDB Entry, Vendor Advisory |
| Security Bulletin: IBM MQ is vulnerable to a remote code execution vulnerability (CVE-2020-4682) |
CONFIRM |
www.ibm.com |
Patch, Vendor Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 375523 IBM MQ Remote Code Execution Vulnerability(6408626)