{
  "document" : {
    "aggregate_severity" : {
      "text" : "hoch"
    },
    "category" : "csaf_base",
    "csaf_version" : "2.0",
    "distribution" : {
      "tlp" : {
        "label" : "WHITE",
        "url" : "https://www.first.org/tlp/"
      }
    },
    "lang" : "de-DE",
    "notes" : [ {
      "category" : "legal_disclaimer",
      "text" : "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen."
    }, {
      "category" : "description",
      "text" : "IBM App Connect Enterprise kombiniert die branchenbewährten Technologien des IBM Integration Bus mit Cloud-nativen Technologien.",
      "title" : "Produktbeschreibung"
    }, {
      "category" : "summary",
      "text" : "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM App Connect Enterprise ausnutzen, um Informationen offenzulegen, um einen Denial of Service Angriff durchzuführen, und um einen nicht näher spezifizierten Angriff durchzuführen.",
      "title" : "Angriff"
    }, {
      "category" : "general",
      "text" : "- Linux\n- Sonstiges\n- UNIX\n- Windows",
      "title" : "Betroffene Betriebssysteme"
    } ],
    "publisher" : {
      "category" : "other",
      "contact_details" : "csaf-provider@cert-bund.de",
      "name" : "Bundesamt für Sicherheit in der Informationstechnik",
      "namespace" : "https://www.bsi.bund.de"
    },
    "references" : [ {
      "category" : "self",
      "summary" : "WID-SEC-W-2025-2160 - CSAF Version",
      "url" : "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2160.json"
    }, {
      "category" : "self",
      "summary" : "WID-SEC-2025-2160 - Portal Version",
      "url" : "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2160"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin vom 2025-09-29",
      "url" : "https://www.ibm.com/support/pages/node/7246566"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2025:18028 vom 2025-10-14",
      "url" : "https://access.redhat.com/errata/RHSA-2025:18028"
    } ],
    "source_lang" : "en-US",
    "title" : "IBM App Connect Enterprise: Schwachstelle ermöglicht Offenlegung von Informationen, Denial of Service, und einen nicht spezifizierten Angriff",
    "tracking" : {
      "current_release_date" : "2025-10-14T22:00:00.000+00:00",
      "generator" : {
        "date" : "2025-10-15T05:30:35.602+00:00",
        "engine" : {
          "name" : "BSI-WID",
          "version" : "1.4.0"
        }
      },
      "id" : "WID-SEC-W-2025-2160",
      "initial_release_date" : "2025-09-29T22:00:00.000+00:00",
      "revision_history" : [ {
        "date" : "2025-09-29T22:00:00.000+00:00",
        "number" : "1",
        "summary" : "Initiale Fassung"
      }, {
        "date" : "2025-10-14T22:00:00.000+00:00",
        "number" : "2",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      } ],
      "status" : "final",
      "version" : "2"
    }
  },
  "product_tree" : {
    "branches" : [ {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<13.0.5.0",
          "product" : {
            "name" : "IBM App Connect Enterprise <13.0.5.0",
            "product_id" : "T047259"
          }
        }, {
          "category" : "product_version",
          "name" : "13.0.5.0",
          "product" : {
            "name" : "IBM App Connect Enterprise 13.0.5.0",
            "product_id" : "T047259-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:app_connect_enterprise:13.0.5.0"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "App Connect Enterprise"
      } ],
      "category" : "vendor",
      "name" : "IBM"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "Apache Camel <4.10.7 for Spring Boot",
          "product" : {
            "name" : "Red Hat Integration Apache Camel <4.10.7 for Spring Boot",
            "product_id" : "T047637"
          }
        }, {
          "category" : "product_version",
          "name" : "Apache Camel 4.10.7 for Spring Boot",
          "product" : {
            "name" : "Red Hat Integration Apache Camel 4.10.7 for Spring Boot",
            "product_id" : "T047637-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:integration:apache_camel__4.10.7_for_spring_boot"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Integration"
      } ],
      "category" : "vendor",
      "name" : "Red Hat"
    } ]
  },
  "vulnerabilities" : [ {
    "cve" : "CVE-2025-4949",
    "product_status" : {
      "known_affected" : [ "T047637", "T047259" ]
    },
    "release_date" : "2025-09-29T22:00:00.000+00:00",
    "title" : "CVE-2025-4949"
  } ]
}