Mitigating Security Vulnerabilities: Moving From ‘Patch Fast’ to ‘Prioritize Smart’

IT leaders are shifting from reactive OEM patching to risk-based remediation strategies to reduce downtime and maintain control of their solutions. 

Welcome to the May Security Update from Origina Security Services. This month, we’re discussing options to OEM patches, highlighting some VMware security vulnerabilities, and sharing the latest security alerts that could affect your IT estate. 

 

OEM Patches Aren’t the Only Path to Risk Reduction 

Across all industries, IT leaders are reassessing the assumption that OEM patching is the only or best way to maintain security. In many cases, so-called critical CVEs turn out to be configuration issues, not true code-level threats. Applying every vendor-released patch without business context can lead to downtime, regression errors, and unnecessary costs—especially in legacy environments where stability is critical. 

Instead, forward-thinking organizations are using risk-based remediation strategies. By conducting targeted security vulnerability assessments and aligning response plans with actual exposure, teams can maintain control and confidence without locking themselves into inflexible support contracts.  

Security resilience isn’t about reacting blindly; it’s about responding wisely. 

 

VMware CVEs Highlight the Need for Smarter Security Posture 

Recent VMware vulnerabilities—such as CVE-2024-22252 and CVE-2024-22253—have sparked concern due to the risk of guest-to-host escape. These disclosures serve as a wake-up call to evaluate how virtualization environments are secured and monitored. Many organizations find that while patches are helpful, they don’t always come with guidance tailored to their architecture or risk profile. 

As a result, there’s a growing shift toward smarter security postures. Companies are investing in contextual CVE analysis and adopting layered defenses like segmentation, privilege restrictions, and monitoring. The focus is moving from simply “patch fast” to “prioritize smart,” recognizing that security is strongest when decisions are driven by risk, not just release notes. 

 

Recent security alerts 

Here are links to the latest and updated software security vulnerabilities available through the Origina Vulnerability Advisory Portal. 

The Vulnerability Advisory Portal is a vital resource, offering unlimited access to proactive mitigation advisories, even when OEM patches or fixes are unavailable. You’ll also find hardening guides and publications with regularly updated information on secure configurations and regulations. 

Ask Origina how we can assist with new functionalities, policy compliance, or regulatory needs — from MFA integration to advanced cryptographic implementation. 

Common Vulnerabilities and Exposures (CVE) ID
(Click on ID to open in Origina VA Portal)
Security Alert
Common Vulnerability Scoring System (CVSS) Score
Affected Versions
IBM Cognos Analytics versions 11.1.1 to 11.1.7 FP7, 11.2.0 to 11.2.4 FP2, and 12.0.0 to 12.0.1 are affected by a Java XML parsing denial of service vulnerability via JAXP.
5.3
11.1.1 – 11.1.7 FP7, 11.2.0 – 11.2.4 FP2, 12.0.0 – 12.0.1
IBM Storage Protect versions 8.1.0.000 through 8.1.23.xxx are affected by a vulnerability in the IBM SDK, Java Technology Edition’s Object Request Broker (ORB) component, which could allow a denial of service attack due to improper enforcement of deserial-ization filters.
5.9
8.1.0.000 – 8.1.23.xxx
IBM Storage Protect Operations Center versions 8.1.0.000 through 8.1.20.000 are vulnerable to a denial of service due to a flaw in the WebSphere Application Server Liberty component.
5.3
8.1.0.000 – 8.1.20.000
IBM Storage Protect Backup-Archive Client versions 8.1.0.0 through 8.1.22.0 are affected by a vulnerability in the Apache Xerces C++ XML parser that could allow a remote attacker to execute arbitrary code due to a use-after-free flaw during the scanning of external DTDs.
8.1
8.1.0.0 – 8.1.22.0
IBM Storage Protect Plus versions 10.1.0 through 10.1.16 are affected by a server-side request forgery (SSRF) vulnerability in the Node.js ‘ip’ package is Public() function, which allows remote attackers to send crafted HTTP requests that can lead the application to initiate requests to arbitrary systems.
2.7
10.1.0 – 10.1.16
IBM Storage Protect Plus versions 10.1.0 through 10.1.16.1 are affected by a vulnerability in the HTTP/2 protocol that allows remote attackers to cause a denial of service by sending excessive CONTIN-UATION frames, leading to resource exhaustion.
7.5
10.1.0 – 10.1.16.1
IBM MQ Operator versions 3.0.0 to 3.4.1 and MQ Advanced container images 9.2.0.1-r1-eus to 9.4.0.7-r1 are vulnerable to unauthorized data access due to a flaw in the Java SE Hotspot component.
4.8
3.0.0 – 3.4.1 (Operator), 9.2.0.1-r1-eus – 9.4.0.7-r1 (Container)
IBM MQ versions 9.2.0.0 through 9.2.0.15 and 9.3.0.0 through 9.3.0.10 are vulnerable to unauthorized data access due to a flaw in the Java SE Hotspot component.
4.8
9.2.0.0 – 9.2.0.15, 9.3.0.0 – 9.3.0.10
IBM Security ReaQta versions 3.9.0 through 3.9.5 are vulnerable to unauthorized data access due to a flaw in the Java SE Hotspot component.
6.5
3.9.0 – 3.9.5
IBM Security Verify Access versions 10.0.0 – 10.0.8 are affected by a file upload path traversal leading to remote code execution.
9.5
Apache Struts versions 2.0.0 to 6.3.9
IBM Storage Protect Plus versions prior to 10.1.16.2 are vulnerable to remote code execution due to an untrusted search path in Go’s CGO build process.
9.8
Before 10.1.16.2
IBM MQ versions 9.3.0.0 through 9.3.0.25 and 9.4.0.0 through 9.4.2.0 are vulnerable to remote code execution due to improper neutral-ization of escape characters in the MQ console.
8.8
9.3.0.0 – 9.3.0.25, 9.4.0.0 – 9.4.2.0
IBM MQ versions 9.3.0.0 through 9.3.0.25 and 9.4.0.0 through 9.4.2.0 are vulnerable to an authorization bypass due to improper handling of SSH public key authen-tication in the Go crypto library.
9.1
9.3.0.0 – 9.3.0.25, 9.4.0.0 – 9.4.2.0
IBM Storage Protect Plus versions 10.1.6 through 10.1.16.2 are affected by a data leakage vulnerability that could lead to unauthorized access to the exploited system and further exploitation within the affected network.
4.4
 IBM Storage Protect Plus versions 10.1.6 through 10.1.16.2 
IBM WebSphere Application Server versions 8.5.0.0 through 8.5.5.23 and 9.0.0.0 through 9.0.5.16 are vulnerable to unauthorized data access due to a flaw in the Java SE Hotspot component.
4.8
8.5.0.0 – 8.5.5.23, 9.0.0.0 – 9.0.5.16
IBM Storage Protect Plus File Systems Agent versions 10.1.6 through 10.1.16.2 are vulnerable to weaker than expected security due to the use of a compro-mised root certificate in the Python-Certified package.
7.5
10.1.6 – 10.1.16.2
IBM Storage Protect Plus versions prior to 10.1.16.2 are vulnerable to remote code execution due to a flaw in the set-up tools package’s package index module.
8.8
Before 10.1.16.2
IBM Storage Protect for Virtual Environ-ments versions prior to 8.1.20.0 are vulnerable to improper input validation in Apache HTTP Client, allowing remote attackers to redirect requests to unintended hosts.
5.3
Before 8.1.20.0
IBM Storage Protect Plus File Systems Agent versions 10.1.6 through 10.1.16.2 are vulnerable to a security bypass due to improper certificate verification handling in the Python requests library.
5.6
10.1.6 – 10.1.16.2
IBM Storage Protect Operations Center versions 8.1.0.0 through 8.1.23.0 are vulnerable to unauthorized data access due to a flaw in the Java SE Hotspot component
5.3
8.1.0.0 – 8.1.23.0
IBM Storage Protect versions 8.1.0.0 through 8.1.6.0 are vulnerable to unauthorized data access due to a flaw in the Java SE component.
5.3
8.1.0.0 – 8.1.6.0
IBM Storage Protect Operations Center versions 8.1.0.0 through 8.1.23.0 are vulnerable to a denial of service due to a flaw in the Java SE Security component.
5.3
8.1.0.0 – 8.1.23.0
VMware Tools for Windows versions 11.x.x and 12.x.x are vulnerable to an authent-ication bypass due to improper access control, which allows low-privileged users to perform high-privilege operations within the guest VM.
7.8
11.x.x – 12.x.x (Windows only)

Security is at the heart of everything we do. Our focus goes beyond addressing individual risks and vulnerabilities. If you’re facing a security, risk, or regulatory challenge and need expert guidance, we’re here to help. Reach out to your Customer Success Manager or submit a request through theOrigina Self-Service Portal. 

FOR THE LATEST TECHNOLOGY TIPS SUBSCRIBE TO OUR NEWSLETTER - THE UPTIME

Gain insight into industry-only news, access to webinars, tips and tricks, blog posts, podcasts, and guides, surrounding topics like cybersecurity, reducing software support and maintenance costs and much more, all delivered to your inbox each month.

LEARN MORE