6.5
CVE-2022-43922
- EPSS 0.03%
- Published 01.02.2023 18:15:10
- Last modified 26.03.2025 19:15:18
- Source psirt@us.ibm.com
- Teams watchlist Login
- Open Login
IBM App Connect Enterprise Certified Container 4.1, 4.2, 5.0, 5.1, 5.2, 6.0, 6.1, and 6.2 could disclose sensitive information to an attacker due to a weak hash of an API Key in the configuration. IBM X-Force ID: 241583.
Data is provided by the National Vulnerability Database (NVD)
Ibm ≫ App Connect Enterprise Certified Container Version4.1
Ibm ≫ App Connect Enterprise Certified Container Version4.2
Ibm ≫ App Connect Enterprise Certified Container Version5.0 SwEditionlts
Ibm ≫ App Connect Enterprise Certified Container Version5.1
Ibm ≫ App Connect Enterprise Certified Container Version5.2
Ibm ≫ App Connect Enterprise Certified Container Version6.0
Ibm ≫ App Connect Enterprise Certified Container Version6.1
Ibm ≫ App Connect Enterprise Certified Container Version6.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.053 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
psirt@us.ibm.com | 5.3 | 1.6 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-326 Inadequate Encryption Strength
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
CWE-328 Use of Weak Hash
The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack).