4.3

CVE-2018-1606

IBM Jazz based applications (IBM Rational Collaborative Lifecycle Management 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational DOORS Next Generation 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Engineering Lifecycle Manager 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Quality Manager 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Rhapsody Design Manager 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Software Architect Design Manager 5.0 through 5.02 and 6.0 through 6.0.1, IBM Rational Team Concert 5.0 through 5.02 and 6.0 through 6.0.6) could allow an authenticated user to obtain sensitive information from an error message that could be used in further attacks against the system. IBM X-Force ID: 143796.

Data is provided by the National Vulnerability Database (NVD)
IbmRational Collaborative Lifecycle Management Version >= 5.0.0 <= 6.0.6
IbmRational Doors Next Generation Version >= 5.0.0 <= 5.0.2
IbmRational Doors Next Generation Version >= 6.0.0 <= 6.0.6
IbmRational Engineering Lifecycle Manager Version >= 5.0.0 <= 5.0.2
IbmRational Engineering Lifecycle Manager Version >= 6.0.0 <= 6.0.6
IbmRational Quality Manager Version >= 5.0.0 <= 5.0.2
IbmRational Quality Manager Version >= 6.0.0 <= 6.0.6
IbmRational Rhapsody Design Manager Version >= 5.0.0 <= 5.0.2
IbmRational Rhapsody Design Manager Version >= 6.0.0 <= 6.0.6
IbmRational Software Architect Design Manager Version >= 5.0.0 <= 5.0.2
IbmRational Software Architect Design Manager Version >= 6.0.0 <= 6.0.1
IbmRational Team Concert Version >= 5.0.0 <= 5.0.2
IbmRational Team Concert Version >= 6.0.0 <= 6.0.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.18% 0.37
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 2.8 1.4
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:P/I:N/A:N
psirt@us.ibm.com 4.3 2.8 1.4
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.