

AWS O Mainframe Modernization Service (experiência em Managed Runtime Environment) não está mais aberto a novos clientes. Para recursos semelhantes ao AWS Mainframe Modernization Service (experiência em Managed Runtime Environment), explore o AWS Mainframe Modernization Service (experiência autogerenciada). Os clientes atuais podem continuar usando o serviço normalmente. Para obter mais informações, consulte Alteração na [disponibilidade AWS da modernização do mainframe](https://docs.aws.amazon.com/m2/latest/userguide/mainframe-modernization-availability-change.html).

As traduções são geradas por tradução automática. Em caso de conflito entre o conteúdo da tradução e da versão original em inglês, a versão em inglês prevalecerá.

# AWS Transforme-se para vulnerabilidades de segurança de mainframe
<a name="ba-security-cve"></a>

Vulnerabilidades e exposições comuns (CVE) é uma lista de vulnerabilidades de segurança cibernética de domínio púbico. Cada entrada contém um número de identificação, uma descrição e pelo menos uma referência pública.

Recomendamos que você sempre atualize para a versão mais recente do AWS Transform for mainframe para se proteger contra vulnerabilidades conhecidas. As verificações de segurança são realizadas continuamente com o [Amazon Inspector](https://aws.amazon.com/inspector/) e as descobertas são classificadas de acordo com a gravidade no [NIST](https://nvd.nist.gov/).

A lista a seguir detalha CVEs as correções em cada versão de lançamento disponível, que resultam do uso de dependências:


| Versão | CVE | 
| --- | --- | 
| [5.125.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-5.125.0) | CVE-2025-7962, CVE-2026-40478, CVE-2026-40477, CVE-2026-29145, CVE-2026-24880, CVE-2026-29146, CVE-2026-29129, CVE-2026-34483, CVE-2026-34487, CVE-2026-32990, CVE-2026-25854, CVE-2026-34500, CVE-2025-67721, CVE-2026-33750, CVE-2025-10492, CVE-2026-22739, CVE-2026-33870, CVE-2026-33871, CVE-2026-22735, CVE-2026-1225, CVE-2026-22737, CVE-2026-24734, CVE-2026-22732, CVE-2026-27904, CVE-2026-32635, CVE-2026-27601, CVE-2026-27903, CVE-2026-29062, CVE-2025-66614, CVE-2026-24733, CVE-2025-69873, CVE-2026-26996 | 
| [5.75.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-5.75.0) | CVE-2026-22610, CVE-2025-67735, CVE-2025-66035, CVE-2025-11226, CVE-2025-64718 | 
| [5.1.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-5.1.0) | CVE-2025-55754, CVE-2025-55752, CVE-2025-61795, CVE-2020-36843, CVE-2025-11226, CVE-2025-41254, CVE-2025-41248, CVE-2025-59052, CVE-2025-41249, CVE-2025-4949, CVE-2024-8184, CVE-2024-6763, CVE-2024-6763, VE-2025-58057, CVE-2025-58056 | 
| [4.10.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.10.0) | CVE-2025-55163, CVE-2025-48924, CVE-2025-53864, CVE-2025-52999, CVE-2025-41234, CVE-2025-49125, CVE-2025-48988, CVE-2025-5889 | 
| [4.9.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.9.0) | CVE-2025-49146, CVE-2025-22871, CVE-2022-41404, CVE-2025-22233, CVE-2025-46701, CVE-2025-22235, CVE-2025-46392, CVE-2025-27820, CVE-2025-24813 | 
| [4.8.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.8.0) | CVE-2025-22228 | 
| [4.7.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.7.0) | CVE-2025-25193, CVE-2025-24970, CVE-2024-47535, CVE-2024-38820, CVE-2024-38809, CVE-2024-22262, CVE-2022-45868 | 
| [4.6.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.6.0) | CVE-2024-12801, CVE-2024-12798, CVE-2024-50379, CVE-2024-56337 | 
| [4.5.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.5.0) | CVE-2024-47535, CVE-2024-52316, CVE-2024-47535, CVE-2024-38827 | 
| [4.4.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.4.0) | CVE-2024-38820, CVE-2024-38821, CVE-2024-38809, CVE-2024-38816, CVE-2024-47554, CVE-2024-6484, CVE-2024-6485 | 
| [4.3.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.3.0) | CVE-2024-43788, CVE-2022-25898, CVE-2021-30246, CVE-2024-21484, CVE-2024-34750 | 
| [4.2.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.2.0) | CVE-2020-11023, CVE-2023-26364, CVE-2019-11358, CVE-2020-11022, CVE-2021-23358, CVE-2017-18214, CVE-2022-24785, CVE-2022-31129, CVE-2023-48631  | 
| [4.1.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.1.0) | CVE-2024-29025, CVE-2024-23080, CVE-2024-22262, CVE-2024-30171, CVE-2024-29857, CVE-2024-30172  | 
| [4.0.0](https://docs.aws.amazon.com/m2/latest/userguide/ba-release-notes.html#ba-release-notes-4.0.0) | CVE-2016-1000027, CVE-2022-1471, CVE-2024-1597, CVE-2024-22243, CVE-2024-22233, CVE-2024-22234, CVE-2024-22259, CVE-2024-22257, CVE-2024-29131, CVE-2024-29133 | 

**nota**  
Para obter detalhes sobre a CVEs correção nas versões anteriores, entre em contato com seu gerente de entrega do AWS Transform for mainframe