## Summary
Potential Enyoy security bypass vulnerability ( CVE-2022-25881) has been identified that may affect IBM Watson Assistant for IBM Cloud Pak for Data. Refer to details for additional information.
## Vulnerability Details
** CVEID: **[CVE-2023-27488]()
** DESCRIPTION: **Envoy could allow a remote attacker to bypass security restrictions, caused by an invalid protobuf in the gRPC client. By sending a specially-crafted request using an HTTP header with non-UTF8 value, an attacker could exploit this vulnerability to bypass authentication and obtain access.
CVSS Base score: 5.4
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/251859]() for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)
## Affected Products and Versions
Affected Product(s)| Version(s)
—|—
Watson Assistant for Cloud Pak for Data| 4.0.2, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.0.8, 4.5.1, 4.5.3, 4.6. 4.6.2, 4.6.3
## Remediation/Fixes
For all affected versions, IBM strongly recommends addressing the vulnerability now by upgrading to the latest (v4.7.0 or later releases) release of IBM Watson Assistant for IBM Cloud Pak for Data which maintains backward compatibility with the versions listed above.
**Product Latest Version**| **Remediation/Fix/Instructions**
—|—
IBM Watson Assistant for IBM Cloud Pak for Data 4.7.0|
Follow instructions for Installing Watson Assistant in Link to Release (v4.7.0 release information)
## Workarounds and Mitigations
None