4.4
CVE-2024-49817
- EPSS 0.02%
- Published 17.12.2024 18:15:23
- Last modified 07.01.2025 17:23:31
- Source psirt@us.ibm.com
- Teams watchlist Login
- Open Login
IBM Security Guardium Key Lifecycle Manager 4.1, 4.1.1, 4.2.0, and 4.2.1 stores user credentials in configuration files which can be read by a local privileged user.
Data is provided by the National Vulnerability Database (NVD)
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.1.0
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.1.1
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.2.0
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.2.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.036 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
psirt@us.ibm.com | 4.4 | 0.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
CWE-260 Password in Configuration File
The product stores a password in a configuration file that might be accessible to actors who do not know the password.
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.