6.5

CVE-2024-45651

IBM Sterling Connect:Direct Web Services 6.1.0, 6.2.0, and 6.3.0 

does not invalidate session after a browser closure which could allow an authenticated user to impersonate another user on the system.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Data is provided by the National Vulnerability Database (NVD)
IbmSterling Connect Direct Web Services Version >= 6.1.0 < 6.1.0.28
   IbmAix Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmSterling Connect Direct Web Services Version >= 6.2.0 < 6.2.0.27
   IbmAix Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmSterling Connect Direct Web Services Version >= 6.3.0 < 6.3.0.13
   IbmAix Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.096
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
psirt@us.ibm.com 6.3 2.8 3.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CWE-613 Insufficient Session Expiration

According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."