CVE-2024-56339

IBM WebSphere Application Server information disclosure

Description

IBM WebSphere Application Server 9.0 and WebSphere Application Server Liberty 17.0.0.3 through 25.0.0.7 could allow a remote attacker to bypass security restrictions caused by a failure to honor security configuration.

Remediation

Solution:

  • For IBM WebSphere Application Server Liberty 17.0.0.3 - 25.0.0.7 using the servlet-3.1, servlet-4.0, servlet-5.0 or servlet-6.0 feature: · Upgrade to minimal fix pack levels as required by the interim fix and then apply the Interim Fix that resolves PH64682 --OR-- · Apply Fix Pack 25.0.0.8 or later (targeted availability 3Q2025). For IBM WebSphere Application Server traditional: For V9.0.0.0 through 9.0.5.24: · Upgrade to minimal fix pack levels as required by the interim fix and then apply the Interim Fix that resolves PH64683 --OR-- · Apply Fix Pack 9.0.5.26 or later (targeted availability 4Q2025). Additional interim fixes may be available and linked off the interim fix download page.

Category

3.7
CVSS
Severity: Low
CVSS 3.1 •
EPSS 0.03%
Vendor Advisory ibm.com
Affected: IBM WebSphere Application Server
Affected: IBM WebSphere Application Server Liberty
Published at:
Updated at:

References

Link Tags
https://www.ibm.com/support/pages/node/7239955 patch vendor advisory

Frequently Asked Questions

What is the severity of CVE-2024-56339?
CVE-2024-56339 has been scored as a low severity vulnerability.
How to fix CVE-2024-56339?
To fix CVE-2024-56339: For IBM WebSphere Application Server Liberty 17.0.0.3 - 25.0.0.7 using the servlet-3.1, servlet-4.0, servlet-5.0 or servlet-6.0 feature: · Upgrade to minimal fix pack levels as required by the interim fix and then apply the Interim Fix that resolves PH64682 --OR-- · Apply Fix Pack 25.0.0.8 or later (targeted availability 3Q2025). For IBM WebSphere Application Server traditional: For V9.0.0.0 through 9.0.5.24: · Upgrade to minimal fix pack levels as required by the interim fix and then apply the Interim Fix that resolves PH64683 --OR-- · Apply Fix Pack 9.0.5.26 or later (targeted availability 4Q2025). Additional interim fixes may be available and linked off the interim fix download page.
Is CVE-2024-56339 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-56339 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-56339?
CVE-2024-56339 affects IBM WebSphere Application Server, IBM WebSphere Application Server Liberty.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.