Security vulnerabilities have been discovered in:
The TIBCO products listed above contain a critical vulnerability in the handling of JMX connections. The impact of this vulnerability may include remote execution of arbitrary code, information disclosure, and denial of service, even with SSL enabled. For details, please see the product advisory.
This issue affects all customers using the above product versions.
Customers with current maintenance can obtain product updates through their TIBCO fulfillment channels.
Customers of OEM partners can receive new versions and bundles from their OEM partners. Please contact your OEM partner for updates.
Please contact TIBCO Support by telephone. Please reference SR:1-BCUYB3 in your communication to indicate the context of your request.
TIBCO takes security very seriously. We perform rigorous testing for every product release, as well as code audits, structured walkthroughs and peer reviews. TIBCO has identified security vulnerabilities in products during internal testing and reviews and corrected them prior to release. TIBCO constantly evaluates and augments its security measures and will continue to do so.
Product advisories can be accessed from http:/services/support/advisories
Customers with a current maintenance contract with TIBCO can log a service request with TIBCO Global Support (please refer to the service request identifiers listed above) and then call your support telephone number. Maintenance customers can also view product-specific Late Breaking News through the TIBCO Support Web.
TIBCO ActiveMatrix® Runtime
The above product versions install a new version of the TIBCO ActiveMatrix Runtime.
For each affected system, customers should update to the corresponding software version:
Once updated software had been installed, customers should recreate their ActiveMatrix environments.
Customers can mitigate the security vulnerability by utilizing a firewall to restrict access to the ActiveMatrix Runtime component.