ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Cree y modernice aplicaciones empresariales con tecnología contemporánea
The leading solution for COBOL application modernization
Modernice aplicaciones de mainframe de IBM, procesos de entrega, accesos e infraestructuras
Modernice el acceso de las aplicaciones al host: más fácil de usar, integrar, gestionar y más seguro
Logre la interoperabilidad de los sistemas en toda la empresa
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Desarrollo seguro, pruebas de seguridad y supervisión y protección continuas
Augment human intelligence
Cifrado, tokenización y gestión de claves para garantizar la eliminación de la información de identificación y la privacidad de los datos
Una estrategia integrada para la gestión de identidades y accesos
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Detecte las amenazas conocidas y desconocidas por medio de la correlación, la ingesta de datos y los análisis
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Una experiencia de usuario final atractiva y un service desk eficiente basados en el aprendizaje automático
La primera solución de supervisión autónoma organizada en contenedores para TI híbrida
Automatice y gestione redes tradicionales, virtuales y definidas por software
Descubra y gestione elementos de configuración (CI) en entornos de TI híbridos.
Simplifique la automatización del cumplimiento y refuerce el gobierno
Automatice los procesos de TI de principio a fin
Manage IT & software assets for better compliance
Automatice el aprovisionamiento, la aplicación de revisiones y el cumplimiento en todo el centro de datos
Cree, asegure y amplíe los procesos de negocio automatizados en toda la empresa
Obtenga información a partir del Big Data con análisis en tiempo real y haga búsquedas en los datos no estructurados.
Toda la formación Micro Focus en un mismo espacio
Fomente las habilidades para tener éxito
Aumente la velocidad, elimine los cuellos de botella y mejore continuamente la entrega del software
ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Access all products in application delivery management
Modernice los sistemas empresariales básicos para impulsar la transformación empresarial
Cree y modernice aplicaciones empresariales con tecnología contemporánea
The leading solution for COBOL application modernization
Modernice aplicaciones de mainframe de IBM, procesos de entrega, accesos e infraestructuras
Modernice el acceso de las aplicaciones al host: más fácil de usar, integrar, gestionar y más seguro
Logre la interoperabilidad de los sistemas en toda la empresa
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Access all products in Application Modernization & Connectivity
La seguridad como parte fundamental de toda su actividad: operaciones, aplicaciones, identidad y datos
Desarrollo seguro, pruebas de seguridad y supervisión y protección continuas
Augment human intelligence
Cifrado, tokenización y gestión de claves para garantizar la eliminación de la información de identificación y la privacidad de los datos
Una estrategia integrada para la gestión de identidades y accesos
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Detecte las amenazas conocidas y desconocidas por medio de la correlación, la ingesta de datos y los análisis
Access all products in CyberRes
Soluciones de privacidad, cumplimiento y legales probadas y de confianza
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Access all products in Information Management and Governance
Acelere las operaciones de TI a la velocidad de DevOps
Una experiencia de usuario final atractiva y un service desk eficiente basados en el aprendizaje automático
La primera solución de supervisión autónoma organizada en contenedores para TI híbrida
Automatice y gestione redes tradicionales, virtuales y definidas por software
Descubra y gestione elementos de configuración (CI) en entornos de TI híbridos.
Simplifique la automatización del cumplimiento y refuerce el gobierno
Automatice los procesos de TI de principio a fin
Manage IT & software assets for better compliance
Automatice el aprovisionamiento, la aplicación de revisiones y el cumplimiento en todo el centro de datos
Cree, asegure y amplíe los procesos de negocio automatizados en toda la empresa
Access all products in IT Operations Management
Diseñe su estrategia y transforme su TI híbrida.
Obtenga información a partir del Big Data con análisis en tiempo real y haga búsquedas en los datos no estructurados.
Mejore la capacidad de su equipo para lograr que su empresa funcione a pleno rendimiento
CVE Description: A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
Yes, and we have a robust, dedicated, full-time threat intelligence team with a Micro Focus-wide view, that is constantly reviewing new reports of vulnerabilities, threats, and compromises for possible impact to our information assets.
Micro Focus implements a Secure Development Lifecycle that includes Supply Chain Security, 3rd Party Component Manifest and 3rd Party Component Monitoring. Using these formal practices, we help ensure that 3rd party components are sourced from trusted repositories, scanned and tested, free of known CVEs, and signed to ensure authenticity. New vulnerabilities are scanned and tracked to ensure closure. Additionally, Micro Focus has scheduled rolling scans using a variety of tools to detect a wide variety of vulnerabilities. Vendor rule sets/signatures and code are typically scrutinized after a new vulnerability announcement. We continue to get updates from our security vendors and internal security community on the latest scanning techniques for CVE-2022-22965 and other vulnerabilities. We also take a risk-based approach to prioritizing which patches get applied first.
We are prioritizing CVE-2022-22965 alongside other patch efforts. We rank potential patches according to CVSS scoring, and also our own enhanced scoring system that takes additional data points into account. Configuration changes or patch installations require Quality Assurance analysis and testing prior to deployment to production systems to prevent unexpected service interruptions.
At present, we are not aware of any current indications of compromise related to CVE-2022-22965 or related vulnerabilities.
At present, we are not aware of any improper access or disclosure of customer data related to CVE-2022-22965 or any related vulnerabilities.
April 4, 2022
Micro Focus continues to monitor CVE-2022-22965 vulnerability closely and issues appropriate patches, security bulletins and communications to support our customers. As this is a still evolving situation we will monitor and actively address changes. Keep watching the Micro Focus Security Bulletins for any changes resulting from further industry analysis of this vulnerability. Micro Focus is committed to continue to provide prompt remediation if the situation develops further. We will periodically update this page to ensure you have the latest information on our status.
If you don’t see your product listed, please come back for updates. Please contact support if urgent.