4.4
CVE-2024-49817
- EPSS 0.05%
- Veröffentlicht 17.12.2024 18:15:23
- Zuletzt bearbeitet 07.01.2025 17:23:31
- Quelle psirt@us.ibm.com
- CVE-Watchlists
- Unerledigt
IBM Security Guardium Key Lifecycle Manager 4.1, 4.1.1, 4.2.0, and 4.2.1 stores user credentials in configuration files which can be read by a local privileged user.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.1.0
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.1.1
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.2.0
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.2.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.16 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@us.ibm.com | 4.4 | 0.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
CWE-260 Password in Configuration File
The product stores a password in a configuration file that might be accessible to actors who do not know the password.
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.