5.9

CVE-2024-39746

IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.

Data is provided by the National Vulnerability Database (NVD)
IbmSterling Connect Direct Web Services Version6.0
   IbmAix Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmSterling Connect Direct Web Services Version6.1.0
   IbmAix Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmSterling Connect Direct Web Services Version6.2.0
   IbmAix Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmSterling Connect Direct Web Services Version6.3.0
   IbmAix Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.076
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
psirt@us.ibm.com 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-319 Cleartext Transmission of Sensitive Information

The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.