IBM Sterling Connect:Direct Web Services used weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. The vulnerability has been addressed.
DESCRIPTION: IBM Sterling Connect:Direct Web Services uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/209508 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Products and Versions
|Sterling Connect Direct Web Services||1.0|
|IBM Connect:Direct Web Services||6.0|
Apply 126.96.36.199, available on Fix Central
Workarounds and Mitigations
Get Notified about Future Security Bulletins
19 Nov 2021: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
22 November 2021