IBM Sterling Connect:Direct for UNIX 1.5 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210574.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/210574 | VDB Entry Vendor Advisory |
https://www.ibm.com/support/pages/node/7010925 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/210574 | VDB Entry Vendor Advisory |
https://www.ibm.com/support/pages/node/7010925 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/210574 - VDB Entry, Vendor Advisory | |
References | () https://www.ibm.com/support/pages/node/7010925 - Patch, Vendor Advisory |
Information
Published : 2023-07-19 02:15
Updated : 2024-11-21 06:18
NVD link : CVE-2021-38933
Mitre link : CVE-2021-38933
CVE.ORG link : CVE-2021-38933
JSON object : View
Products Affected
linux
- linux_kernel
oracle
- solaris
ibm
- aix
- sterling_connect\
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm