Vulns brought by the recommended Wildfly version 26.1.3-Final for EJBCA 8.3.2 #621
Replies: 2 comments
-
Any answer ? |
Beta Was this translation helpful? Give feedback.
-
In general you will have to do vulnerability exposure management and look if you are affected by these CVEs. For WildFly the wildfly project is a good place, or JBoss EAP to get a supported version. You can harden WildFly quite some by removing unused components and such, even upgrading some libs. In the documentation there are some descriptions on what modules are used by EJBCA. The EJBCA team does vulnerability exposure analysis on CVEs. There is a plan to start publishing this analysis on the doc site, but it’s not there yet as far as I can see. |
Beta Was this translation helpful? Give feedback.
-
Hello,
Using NexusIQ on EJBCA 8.3.2 relying on Wildfly 26.1.3-Final, I got this:
How to get rid of these vulns ? Our customers won't accept this situation !
Best Regards.
Beta Was this translation helpful? Give feedback.
All reactions