4.4
CVE-2024-49817
- EPSS 0.04%
- Veröffentlicht 17.12.2024 18:15:23
- Zuletzt bearbeitet 07.01.2025 17:23:31
- Quelle psirt@us.ibm.com
- CVE-Watchlists
- Unerledigt
IBM Security Guardium Key Lifecycle Manager information disclosure
IBM Security Guardium Key Lifecycle Manager 4.1, 4.1.1, 4.2.0, and 4.2.1 stores user credentials in configuration files which can be read by a local privileged user.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.1.0
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.1.1
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.2.0
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.2.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.117 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@us.ibm.com | 4.4 | 0.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
CWE-260 Password in Configuration File
The product stores a password in a configuration file that might be accessible to actors who do not know the password.
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.