

AWS Il servizio di modernizzazione del mainframe (esperienza Managed Runtime Environment) non è più aperto a nuovi clienti. Per funzionalità simili a AWS Mainframe Modernization Service (esperienza Managed Runtime Environment), esplora AWS Mainframe Modernization Service (Self-Managed Experience). I clienti esistenti possono continuare a utilizzare il servizio normalmente. [Per ulteriori informazioni, consulta AWS Modifica della disponibilità di Mainframe Modernization.](https://docs.aws.amazon.com/m2/latest/userguide/mainframe-modernization-availability-change.html)

Le traduzioni sono generate tramite traduzione automatica. In caso di conflitto tra il contenuto di una traduzione e la versione originale in Inglese, quest'ultima prevarrà.

# AWS Trasforma per le vulnerabilità di sicurezza del mainframe
<a name="ba-security-cve"></a>

Common Vulnerabilities and Exposures (CVE) è un elenco di riferimento per le vulnerabilità di sicurezza informatica note pubblicamente. Ogni voce contiene un numero di identificazione, una descrizione e almeno un riferimento pubblico.

Ti consigliamo di eseguire sempre l'aggiornamento alla versione più recente di AWS Transform for mainframe per proteggerti dalle vulnerabilità note. [Le scansioni di sicurezza vengono eseguite continuamente con [Amazon](https://aws.amazon.com/inspector/) Inspector e i risultati vengono classificati in base alla loro gravità nel NIST.](https://nvd.nist.gov/)

L'elenco seguente descrive in dettaglio le CVEs correzioni presenti in ciascuna versione secondaria disponibile, derivanti dall'uso delle dipendenze:


| Versione | CVE | 
| --- | --- | 
| [5.75.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-5.75.0) | CVE-2026-22610, CVE-2025-67735, CVE-2025-66035, CVE-2025-11226, CVE-2025-64718 | 
| [5.1.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-5.1.0) | CVE-2025-55754, CVE-2025-55752, CVE-2025-61795, CVE-2020-36843, CVE-2025-11226, CVE-2025-41254, CVE-2025-41248, CVE-2025-59052, CVE-2025-41249, CVE-2025-4949, CVE-2024-8184, CVE-2024-6763, CVE-2025-58057, CVE-2025-58056 | 
| [4,10,0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.10.0) | CVE-2025-55163, CVE-2025-48924, CVE-2025-53864, CVE-2025-52999, CVE-2025-41234, CVE-2025-49125, CVE-2025-48988, CVE-2025-5889 | 
| [4.9.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.9.0) | CVE-2025-49146, CVE-2025-22871, CVE-2022-41404, CVE-2025-22233, CVE-2025-46701, CVE-2025-22235, CVE-2025-46392, CVE-2025-27820, CVE-2025-24813 | 
| [4.8.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.8.0) | CVE-2025-22228 | 
| [4.7.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.7.0) | CVE-2025-25193, CVE-2025-24970, CVE-2024-47535, CVE-2024-38820, CVE-2024-38809, CVE-2024-22262, CVE-2022-45868 | 
| [4.6.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.6.0) | CVE-2024-12801, CVE-2024-12798, CVE-2024-50379, CVE-2024-56337 | 
| [4.5.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.5.0) | CVE-2024-47535, CVE-2024-52316, CVE-2024-47535, CVE-2024-38827 | 
| [4.4.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.4.0) | CVE-2024-38820, CVE-2024-38821, CVE-2024-38809, CVE-2024-38816, CVE-2024-47554, CVE-2024-6484, CVE-2024-6485 | 
| [4.3.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.3.0) | CVE-2024-43788, CVE-2022-25898, CVE-2021-30246, CVE-2024-21484, CVE-2024-34750 | 
| [4.2.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.2.0) | CVE-2020-11023, CVE-2023-26364, CVE-2019-11358, CVE-2020-11022, CVE-2021-23358, CVE-2017-18214, CVE-2022-24785, CVE-2022-31129, CVE-2023-48631  | 
| [4.1.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.1.0) | CVE-2024-29025, CVE-2024-23080, CVE-2024-22262, CVE-2024-30171, CVE-2024-29857, CVE-2024-30172  | 
| [4,0,0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.0.0) | CVE-2016-1000027, CVE-2022-1471, CVE-2024-1597, CVE-2024-22243, CVE-2024-22233, CVE-2024-22234, CVE-2024-22259, CVE-2024-22257, CVE-2024-29131, CVE-2024-29133 | 

**Nota**  
Per i dettagli sui CVEs problemi risolti nelle versioni precedenti, contatta il tuo responsabile della distribuzione di AWS Transform for mainframe