ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
使用當代技術建立業務應用程式並實現業務應用程式的現代化
The leading solution for COBOL application modernization
將 IBM 大型主機應用程式、交付過程、存取及基礎結構現代化
將主機應用程式存取現代化:更容易使用、整合、管理,而且也更安全
達到企業內系統互通
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
安全開發、安全性測試、持續監控與保護
Augment human intelligence
適用於資料去識別化和隱私的加密、憑證化和金鑰管理
身份識別與存取管理的整合方法
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
透過關聯、資料擷取與分析功能,偵測已知與未知的威脅
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
以機器學習為基礎,加強終端使用者體驗並提高服務台效率
混合式 IT 的第一個容器化自主監控解決方案
自動管理傳統網路、虛擬網路和軟體定義的網路
探索與管理混合 IT 環境中的組態項目 (CI)。
簡化履行自動化並執行管理
將端對端 IT 程序自動化
Manage IT & software assets for better compliance
在整個資料中心自動化佈建、修補與合規作業
在企業內建立、保護和擴展自動化業務流程
Micro Focus 一站式訓練
培養邁向成功的技能
加快速度、消除瓶頸,不斷提升軟體交付能力
ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Access all products in application delivery management
實現核心業務系統的現代化以推動業務轉型
使用當代技術建立業務應用程式並實現業務應用程式的現代化
The leading solution for COBOL application modernization
將 IBM 大型主機應用程式、交付過程、存取及基礎結構現代化
將主機應用程式存取現代化:更容易使用、整合、管理,而且也更安全
達到企業內系統互通
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Access all products in Application Modernization & Connectivity
為您所有工作的核心提供安全防護,包含營運、應用程式、身分識別與資料
安全開發、安全性測試、持續監控與保護
Augment human intelligence
適用於資料去識別化和隱私的加密、憑證化和金鑰管理
身份識別與存取管理的整合方法
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
透過關聯、資料擷取與分析功能,偵測已知與未知的威脅
Access all products in CyberRes
值得信賴、經過法律驗證、遵循法規和隱私的解決方案
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Access all products in Information Management and Governance
使 IT Operations 與 DevOps 齊頭並進
以機器學習為基礎,加強終端使用者體驗並提高服務台效率
混合式 IT 的第一個容器化自主監控解決方案
自動管理傳統網路、虛擬網路和軟體定義的網路
探索與管理混合 IT 環境中的組態項目 (CI)。
簡化履行自動化並執行管理
將端對端 IT 程序自動化
Manage IT & software assets for better compliance
在整個資料中心自動化佈建、修補與合規作業
在企業內建立、保護和擴展自動化業務流程
Access all products in IT Operations Management
制定策略並轉變您的混合 IT。
透過即時分析和搜尋非結構資料,從大數據獲得深刻見解。
賦予團隊強大力量,完整發揮事業潛力
CVE Description: A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
Yes, and we have a robust, dedicated, full-time threat intelligence team with a Micro Focus-wide view, that is constantly reviewing new reports of vulnerabilities, threats, and compromises for possible impact to our information assets.
Micro Focus implements a Secure Development Lifecycle that includes Supply Chain Security, 3rd Party Component Manifest and 3rd Party Component Monitoring. Using these formal practices, we help ensure that 3rd party components are sourced from trusted repositories, scanned and tested, free of known CVEs, and signed to ensure authenticity. New vulnerabilities are scanned and tracked to ensure closure. Additionally, Micro Focus has scheduled rolling scans using a variety of tools to detect a wide variety of vulnerabilities. Vendor rule sets/signatures and code are typically scrutinized after a new vulnerability announcement. We continue to get updates from our security vendors and internal security community on the latest scanning techniques for CVE-2022-22965 and other vulnerabilities. We also take a risk-based approach to prioritizing which patches get applied first.
We are prioritizing CVE-2022-22965 alongside other patch efforts. We rank potential patches according to CVSS scoring, and also our own enhanced scoring system that takes additional data points into account. Configuration changes or patch installations require Quality Assurance analysis and testing prior to deployment to production systems to prevent unexpected service interruptions.
At present, we are not aware of any current indications of compromise related to CVE-2022-22965 or related vulnerabilities.
At present, we are not aware of any improper access or disclosure of customer data related to CVE-2022-22965 or any related vulnerabilities.
April 4, 2022
Micro Focus continues to monitor CVE-2022-22965 vulnerability closely and issues appropriate patches, security bulletins and communications to support our customers. As this is a still evolving situation we will monitor and actively address changes. Keep watching the Micro Focus Security Bulletins for any changes resulting from further industry analysis of this vulnerability. Micro Focus is committed to continue to provide prompt remediation if the situation develops further. We will periodically update this page to ensure you have the latest information on our status.
If you don’t see your product listed, please come back for updates. Please contact support if urgent.