Vulnerability Name: CVE-2022-3676 (CCN-239608) Assigned: 2022-10-19 Published: 2022-10-19 Updated: 2022-10-25 Summary: In Eclipse Openj9 before version 0.35.0, interface calls can be inlined without a runtime type check. Malicious bytecode could make use of this inlining to access or modify memory via an incompatible type. CVSS v3 Severity: 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N )5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): None
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N )5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): None
CVSS v2 Severity: 6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): None
Vulnerability Type: CWE-843 Vulnerability Consequences: Bypass Security References: Source: MITRE Type: CNACVE-2022-3676 Source: XF Type: UNKNOWNeclipse-cve20223676-sec-bypass(239608) Source: CCN Type: Openj9 GIT RepositoryDisallow nop guards for interface call sites #16122 Source: CCN Type: IBM Security Bulletin 6838545 (Semeru Runtimes)Multiple vulnerabilities may affect IBM Semeru Runtime Source: CCN Type: IBM Security Bulletin 6839777 (Java)CVE-2022-3676 may affect IBM SDK, Java Technology Edition Source: CCN Type: IBM Security Bulletin 6841475 (ILOG CPLEX Optimization Studio)A vulnerability in IBM Java Runtime affects IBM ILOG CPLEX Optimization Studio (CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 6844869 (Event Streams)Vulnerabilities in the Java JDK affect IBM Event Streams (CVE-2022-3676, CVE-2022-21628, CVE-2022-21626, CVE-2022-21624, CVE-2022-21619) Source: CCN Type: IBM Security Bulletin 6845452 (ITCAM for Transactions)IBM SDK, Java Technology Edition Quarterly CPU - Jan 2022 - Includes Oracle January 2022 CPU affects IBM Tivoli Composite Application Manager for Transactions-Robotic Response Time Source: CCN Type: IBM Security Bulletin 6845546 (Tivoli Business Service Manager)A security vulnerability has been identified in IBM SDK, Java Technology Edition shipped with IBM Tivoli Business Service Manager (CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 6846157 (Data Risk Manager)IBM Data Risk Manager is affected by multiple vulnerabilities including remote code execution in Apache Commons Text 1.9 Source: CCN Type: IBM Security Bulletin 6846619 (z/Transaction Processing Facility)Multiple vulnerabilities in IBM Java Runtime affect z/Transaction Processing Facility Source: CCN Type: IBM Security Bulletin 6847341 (Tivoli Netcool Impact)Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli Netcool Impact (CVE-2021-41041, CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 6851347 (CICS Transaction Gateway)Vulnerability (CVE-2022-3676) in Eclipse Openj9 affects CICS Transaction Gateway Desktop Edition Source: CCN Type: IBM Security Bulletin 6851437 (AIX)Multiple vulnerabilities in IBM Java SDK affect AIX Source: CCN Type: IBM Security Bulletin 6852437 (Security SOAR)IBM Security SOAR is using a component with a known vulnerability - IBM JDK 8.0.7.16 and earlier Source: CCN Type: IBM Security Bulletin 6854413 (Liberty for Java for Cloud)Multiple Vulnerabilities in IBM Java SDK affects Liberty for Java for IBM Cloud due to the October 2022 CPU plus CVE-2022-3676 Source: CCN Type: IBM Security Bulletin 6854647 (Tivoli Monitoring)Vulnerabilities in IBM Java included with IBM Tivoli Monitoring. Source: CCN Type: IBM Security Bulletin 6854713 (Voice Gateway)Multiple Vulnerabilities in Java and Node.js packages affect IBM Voice Gateway Source: CCN Type: IBM Security Bulletin 6855115 (Watson Discovery)IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Java Source: CCN Type: IBM Security Bulletin 6855585 (Rational Functional Tester)A vulnerability in Open JDK affecting Rational Functional Tester Source: CCN Type: IBM Security Bulletin 6855623 (Tivoli Application Dependency Discovery Manager)IBM SDK Java Technology Edition, is used by IBM Tivoli Application Dependency Discovery Manager (TADDM) and is vulnerable to a denial of service (CVE-2022-21541, CVE-2022-21540, CVE-2021-2163) Source: CCN Type: IBM Security Bulletin 6856441 (Cloud Transformation Advisor)IBM Cloud Transformation Advisor is vulnerable to multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6857701 (Robotic Process Automation for Cloud Pak)Multiple security vulnerabilities in Java may affect IBM Robotic Process Automation (CVE-2022-21628, CVE-2022-21626, CVE-2022-21624, CVE-2022-21619, CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 6857999 (Cloud Pak for Business Automation)Security vulnerabilities are addressed with IBM Cloud Pak for Business Automation iFixes for January 2023 Source: CCN Type: IBM Security Bulletin 6890603 (Enterprise Content Management System Monitor)Enterprise Content Management System Monitor is affected by a vulnerability in Eclipse Openj9 Source: CCN Type: IBM Security Bulletin 6909481 (Sterling Connect:Direct File Agent)IBM Sterling Connect:Direct File Agent is vulnerable to a memory exploit due to Eclipse Openj9 (CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 6912697 (WebSphere Application Server Patterns)Multiple vulnerabilities in IBM Java SDK affects IBM WebSphere Application Server October 2022 CPU that is bundled with IBM WebSphere Application Server Patterns Source: CCN Type: IBM Security Bulletin 6953579 (i)IBM Java SDK and IBM Java Runtime for IBM i are vulnerable to bypassing security restrictions, denial of service attacks, and data integrity impacts due to multiple vulnerabilities. Source: CCN Type: IBM Security Bulletin 6953807 (Watson Assistant for Cloud Pak for Data)IBM Watson Assistant for IBM Cloud Pak for Data is vulnerable to Eclipse Openj9 security bypass (CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 6953879 (Rational Business Developer)Vulnerability in IBM Java SDK and IBM Java Runtime affects Rational Business Developer Source: CCN Type: IBM Security Bulletin 6954421 (CICS Transaction Gateway)Vulnerability (CVE-2022-3676) in Eclipse Openj9 affects CICS Transaction Gateway Desktop Edition Source: CCN Type: IBM Security Bulletin 6954673 (SPSS Collaboration and Deployment Services)Vulnerabilities in IBM Semeru Runtime affect SPSS Collaboration and Deployment Services (CVE-2022-21628, CVE-2022-21626, CVE-2022-21618, CVE-2022-39399, CVE-2022-21624, CVE-2022-21619, CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 6954675 (SPSS Collaboration and Deployment Services)Vulnerability in IBM Java Runtime affect SPSS Collaboration and Deployment Services (CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 6954681 (Power HMC)Vulnerability in IBM Java (CVE-2022-3676) affects Power HMC Source: CCN Type: IBM Security Bulletin 6954701 (TXSeries for Multiplatforms) CVE-2022-3676 may affect IBM TXSeries for Multiplatforms Source: CCN Type: IBM Security Bulletin 6955281 (Sterling Control Center)IBM Sterling Control Center is vulnerable to security bypass due to Eclipse Openj9 (CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 6955497 (Content Collector)CVE-2022-3676 may affect Eclipse Openj9 used by Content Collector for Email, Content Collector for File Systems and Content Collector for Microsoft SharePoint Source: CCN Type: IBM Security Bulletin 6957822 (z/Transaction Processing Facility)Multiple vulnerabilities in IBM Semeru Runtime affect z/Transaction Processing Facility Source: CCN Type: IBM Security Bulletin 6958074 (CICS TX Standard)CVE-2022-3676 may affect IBM CICS TX Standard Source: CCN Type: IBM Security Bulletin 6958086 (CICS TX Advanced)CVE-2022-3676 may affect IBM CICS TX Advanced Source: CCN Type: IBM Security Bulletin 6959625 (Rational Software Architect Designer)IBM SDK, Java Technology Edition Quarterly CPU - Oct 2022 - Includes Oracle October 2022 CPU and IBM Java - OpenJ9 CVE-2022-3676 Source: CCN Type: IBM Security Bulletin 6962791 (Rational Application Developer)IBM SDK, Java Technology Edition, Security Update February 2023 Source: CCN Type: IBM Security Bulletin 6963075 (Security Guardium)IBM Security Guardium is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6967333 (QRadar SIEM)IBM QRadar SIEM includes components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 6981073 (Security Verify Governance)IBM Security Verify Governance is vulnerable to remote security bypass (CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 6987029 (Content Manager Enterprise Edition)IBM Content Manager Enterprise Edition is affected by a vulnerability in Eclipse Openj9 Source: CCN Type: IBM Security Bulletin 6987143 (Sterling Secure Proxy)IBM Sterling Secure Proxy is vulnerable to multiple vulnerabilities due to IBM Java Runtime Source: CCN Type: IBM Security Bulletin 6987177 (Sterling External Authentication Server)IBM Sterling External Authentication Server is vulnerable to multiple vulnerabilities due to IBM Java Runtime Source: CCN Type: IBM Security Bulletin 6995185 (WebSphere Service Registry and Repository)Multiple vulnerabilities in IBM Java SDK affect WebSphere Service Registry and Repository due to October 2022 CPU and January 2023 CPU plus deferred CVE-2022-21426 and CVE-2022-3676 Source: CCN Type: IBM Security Bulletin 7000941 (Tivoli Netcool Configuration Manager)A vulnerability exists in the IBM? SDK, Java? Technology Edition affect IBM Tivoli Network Configuration Manager (CVE-2022-3676). Source: CCN Type: IBM Security Bulletin 7004703 (Rational Performance Tester)Vulnerability in Eclipse OpenJ9 affects Rational Performance Tester (CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 7004705 (Rational Service Tester)Vulnerability in Eclipse OpenJ9 affects Rational Service Tester (CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 7005583 (Spectrum Protect)Vulnerabilities in Eclipse OpenJ9 may affect IBM Storage Protect Server (CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 7006015 (Cloud Pak System)Multiple Vunerabilities in IBM Java SDK affect IBM Cloud Pak System Source: CCN Type: IBM Security Bulletin 7008901 (Security Verify Governance)A security vulnerability has been fixed in IBM Security Verify Governance, Identity Manager virtual appliance component (CVE-2022-3676) Source: CCN Type: IBM Security Bulletin 7008991 (App Connect Enterprise)Multiple vulnerabilities in IBM SDK Java affect IBM App Connect Enterprise and IBM Integration Bus Source: CCN Type: IBM Security Bulletin 7009327 (Cloud Application Performance Management)Multiple vulnerabilities in the IBM SDK, Java Technology Edition affects APM Agents for Monitoring Source: CCN Type: IBM Security Bulletin 7014913 (Rational Synergy)Multiple Vulnerabilities in Rational Synergy 7.2.2.5 Source: CCN Type: Mend Vulnerability DatabaseCVE-2022-3676 Vulnerable Configuration: Configuration CCN 1 :cpe:/o:ibm:aix:7.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cics_transaction_gateway:9.0:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_monitoring:6.3.0:*:*:*:*:*:*:* OR cpe:/o:ibm:i:7.2:*:*:*:*:*:*:* OR cpe:/a:ibm:cics_transaction_gateway:9.1:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_service_registry_and_repository:8.5:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_netcool_configuration_manager:6.4.1:*:*:*:*:*:*:* OR cpe:/a:ibm:spss_collaboration_and_deployment_services:7.0:*:*:*:*:*:*:* OR cpe:/a:ibm:content_collector:4.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:txseries:8.1:*:*:*:*:*:*:* OR cpe:/a:ibm:txseries:8.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_business_developer:9.5:*:*:*:*:*:*:* OR cpe:/o:ibm:i:7.3:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_application_server_patterns:1.0.0.0:*:*:*:*:*:*:* OR cpe:/o:ibm:aix:7.2:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_netcool_configuration_manager:6.4.2:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_protect:8.1:*:*:*:*:*:*:* OR cpe:/a:ibm:spss_collaboration_and_deployment_services:8.0:*:*:*:*:*:*:* OR cpe:/a:ibm:spss_collaboration_and_deployment_services:8.1:*:*:*:*:*:*:* OR cpe:/a:ibm:spss_collaboration_and_deployment_services:8.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:10.5:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_application_server_patterns:1.0.0.7:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_application_server_patterns:2.2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_monitoring:6.3.0.7:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_performance_tester:9.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_software_architect_designer:9.6:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_netcool/impact:7.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:ilog_cplex_optimization_studio:12.8:*:*:*:*:*:*:* OR cpe:/a:ibm:app_connect:11.0.0.1:*:*:*:enterprise:*:*:* OR cpe:/a:ibm:security_guardium:10.6:*:*:*:*:*:*:* OR cpe:/a:ibm:ilog_cplex_optimization_studio:12.9:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_application_performance_management:8.1.4:*:*:*:*:advanced_private:*:* OR cpe:/a:ibm:tivoli_business_service_manager:6.2.0:*:*:*:*:*:*:* OR cpe:/o:ibm:i:7.4:*:*:*:*:*:*:* OR cpe:/a:ibm:java:7.0.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:java:7.1.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:java:8.0.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:vios:3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:voice_gateway:1.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:voice_gateway:1.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_transformation_advisor:2.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:ilog_cplex_optimization_studio:12.10:*:*:*:*:*:*:* OR cpe:/a:ibm:txseries:9.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:voice_gateway:1.0.2.4:*:*:*:*:*:*:* OR cpe:/a:ibm:voice_gateway:1.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_business_developer:9.6:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_system:2.3.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:spss_collaboration_and_deployment_services:8.2:*:*:*:*:*:*:* OR cpe:/a:ibm:spss_collaboration_and_deployment_services:8.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4:-:*:*:*:*:*:* OR cpe:/a:ibm:voice_gateway:1.0.5:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_system:2.3.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_service_tester:9.5:*:*:*:soa_quality:*:*:* OR cpe:/a:ibm:event_streams:10.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_application_developer:9.6:*:*:*:websphere:*:*:* OR cpe:/a:ibm:voice_gateway:1.0.7:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_service_tester:9.2:*:*:*:soa_quality:*:*:* OR cpe:/a:ibm:security_guardium:11.3:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.4:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_secure_proxy:6.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:secure_external_authentication_server:6.0.3:*:*:*:*:*:*:* OR cpe:/o:ibm:aix:7.3:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_business_automation:18.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_business_automation:18.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_business_automation:19.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_business_automation:19.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_business_automation:20.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_business_automation:20.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_business_automation:21.0.1:-:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_business_automation:21.0.2:-:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_business_automation:21.0.3:-:*:*:*:*:*:* OR cpe:/o:ibm:i:7.5:*:*:*:*:*:*:* OR cpe:/a:ibm:cics_tx:11.1:*:*:*:standard:*:*:* OR cpe:/a:ibm:cics_tx:11.1:*:*:*:advanced:*:*:* OR cpe:/a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_business_automation:22.0.1:-:*:*:*:*:*:* OR cpe:/a:ibm:cics_transaction_gateway:9.2:*:*:*:*:*:*:* OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.7:*:*:*:*:*:*:* OR cpe:/a:ibm:robotic_process_automation:21.0.7:*:*:*:*:*:*:* OR cpe:/a:ibm:robotic_process_automation:23.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_business_automation:22.0.2:-:*:*:*:*:*:* OR cpe:/a:ibm:sterling_external_authentication_server:6.1.0:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
ibm aix 7.1
ibm cics transaction gateway 9.0
ibm tivoli monitoring 6.3.0
ibm i 7.2
ibm cics transaction gateway 9.1
ibm websphere service registry and repository 8.5
ibm tivoli netcool configuration manager 6.4.1
ibm spss collaboration and deployment services 7.0
ibm content collector 4.0.1
ibm txseries 8.1
ibm txseries 8.2
ibm rational business developer 9.5
ibm i 7.3
ibm websphere application server patterns 1.0.0.0
ibm aix 7.2
ibm tivoli netcool configuration manager 6.4.2
ibm spectrum protect 8.1
ibm spss collaboration and deployment services 8.0
ibm spss collaboration and deployment services 8.1
ibm spss collaboration and deployment services 8.1.1
ibm security guardium 10.5
ibm websphere application server patterns 1.0.0.7
ibm websphere application server patterns 2.2.0.0
ibm tivoli monitoring 6.3.0.7
ibm rational performance tester 9.2
ibm rational software architect designer 9.6
ibm tivoli netcool/impact 7.1.0
ibm ilog cplex optimization studio 12.8
ibm app connect 11.0.0.1
ibm security guardium 10.6
ibm ilog cplex optimization studio 12.9
ibm cloud application performance management 8.1.4
ibm tivoli business service manager 6.2.0
ibm i 7.4
ibm java 7.0.0.0
ibm java 7.1.0.0
ibm java 8.0.0.0
ibm vios 3.1
ibm voice gateway 1.0.2
ibm voice gateway 1.0.3
ibm cloud transformation advisor 2.0.1
ibm ilog cplex optimization studio 12.10
ibm txseries 9.1
ibm tivoli application dependency discovery manager 7.3.0.0
ibm voice gateway 1.0.2.4
ibm voice gateway 1.0.4
ibm rational business developer 9.6
ibm cloud pak system 2.3.1.1
ibm spss collaboration and deployment services 8.2
ibm spss collaboration and deployment services 8.2.1
ibm qradar security information and event manager 7.4 -
ibm voice gateway 1.0.5
ibm event streams 10.0.0
ibm cloud pak system 2.3.2.0
ibm rational service tester 9.5
ibm event streams 10.1.0
ibm rational application developer 9.6
ibm voice gateway 1.0.7
ibm rational service tester 9.2
ibm security guardium 11.3
ibm event streams 10.2.0
ibm app connect enterprise 12.0.1.0
ibm event streams 10.3.0
ibm event streams 10.3.1
ibm security guardium 11.4
ibm sterling secure proxy 6.0.3
ibm secure external authentication server 6.0.3
ibm aix 7.3
ibm cloud pak for business automation 18.0.0
ibm cloud pak for business automation 18.0.2
ibm cloud pak for business automation 19.0.1
ibm cloud pak for business automation 19.0.3
ibm cloud pak for business automation 20.0.1
ibm cloud pak for business automation 20.0.3
ibm cloud pak for business automation 21.0.1 -
ibm cloud pak for business automation 21.0.2 -
ibm cloud pak for business automation 21.0.3 -
ibm i 7.5
ibm cics tx 11.1
ibm cics tx 11.1
ibm security verify governance 10.0
ibm cloud pak for business automation 22.0.1 -
ibm cics transaction gateway 9.2
ibm robotic process automation for cloud pak 21.0.7
ibm robotic process automation 21.0.7
ibm robotic process automation 23.0.0
ibm cloud pak for business automation 22.0.2 -
ibm sterling external authentication server 6.1.0