Cyber Posture

CVE-2023-38010

Medium

Published: 04 February 2026

Published
04 February 2026
Modified
25 February 2026
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score 0.0001 3.1th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2023-38010 is a medium-severity Generation of Error Message Containing Sensitive Information (CWE-209) vulnerability in Ibm Os Image For Red Hat Linux Systems. Its CVSS base score is 5.3 (Medium).

Operationally, ranked at the 3.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-209

Detects error messages that leak sensitive information as evidence of disclosure.

addresses: CWE-209

The control directly mitigates generation of error messages containing sensitive authentication details by requiring obscured feedback instead of verbose responses.

addresses: CWE-209

Misdirection allows generation of misleading error messages that withhold or falsify sensitive details.

addresses: CWE-209

Explicitly requires error messages to avoid including sensitive or exploitable details while still supporting corrective action.

addresses: CWE-209

Validation ensures error messages contain only expected, non-sensitive content and blocks leakage via verbose errors.

addresses: CWE-209

Fail-safe procedures can be defined to suppress or sanitize error output, reducing generation of messages that contain sensitive information.

NVD Description

IBM Cloud Pak System displays sensitive information in user messages that could aid in further attacks against the system.

Deeper analysisAI

CVE-2023-38010 is a vulnerability in IBM Cloud Pak System that results in the exposure of sensitive information within user messages, potentially aiding attackers in subsequent exploitation of the system. This issue aligns with CWE-209 (Generation of Error Message Containing Sensitive Information) and carries a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating medium severity primarily due to low-impact confidentiality loss.

The vulnerability can be exploited by unauthenticated attackers over the network with low complexity and no user interaction required. Successful exploitation allows remote access to sensitive details displayed in user messages, providing reconnaissance data that could facilitate further attacks against the IBM Cloud Pak System, though it does not enable direct integrity or availability impacts.

IBM's security advisory provides details on mitigation, available at https://www.ibm.com/support/pages/node/7254419. Security practitioners should consult this reference for patching instructions and workarounds specific to affected IBM Cloud Pak System deployments.

Details

CWE(s)

Affected Products

ibm
cloud pak system
2.3.4.0, 2.3.4.1, 2.3.5.0, 2.3.6.0
ibm
os image for red hat linux systems
4.0.4.0, 4.0.5.0, 4.0.6.0, 4.0.7.0, 5.0.0.0

CVEs Like This One

CVE-2023-38713Same product: Ibm Cloud Pak System
CVE-2023-38716Same product: Ibm Cloud Pak System
CVE-2023-38714Same product: Ibm Cloud Pak System
CVE-2023-38272Same product: Ibm Cloud Pak System
CVE-2023-38013Same product: Ibm Cloud Pak System
CVE-2025-13726Same vendor: Ibm
CVE-2024-56340Same vendor: Ibm
CVE-2024-43187Same vendor: Ibm
CVE-2025-0162Same vendor: Ibm
CVE-2024-28766Same vendor: Ibm

References