ALERT: Some images may not load properly within the Knowledge Base Article. If you see a broken image, please right-click and select 'Open image in a new tab'. We apologize for this inconvenience.

JCS version disclosure


Article ID: 213446


Updated On:


CA Identity Manager


The customer is using N- MAP" for scanning Identity manager components installed on the server and found the below vulnerabilities.


Database: MSSQL server 2012

Version Disclosure

Port 22001 Jetty 7.2.2.v20101205



Ports 22001 and 22002 are open. To verify use the below command

netstat -abn | findstr 22001*


IDM version: 14.3CP2 on windows server 2012 r2


Make sure the customer is using different ports for the JCS connector. we can resolve the vulnerability by disabling the ports.


On the installed server

1) Go to the path C:\Program Files (x86)\CA\Identity Manager\Connector Server\jcs\conf\

2)Open the file server_osgi_common.xml

3) Under the  <transportConnectors> section

Comment the first two lines as shown below



#<transportConnector name="http" uri="" />

#<transportConnector name="https" uri="" />

<!-- to disable TLSv1.0; comment the line above and uncomment the following line --> <!--

<transportConnector name="https" uri=",TLSv1.2" /> -->

</transportConnectors> </broker>

4) Now restart the Jcs connector services