3.7
CVE-2024-49820
- EPSS 0.06%
- Veröffentlicht 17.12.2024 18:15:24
- Zuletzt bearbeitet 10.01.2025 17:42:53
- Quelle psirt@us.ibm.com
- CVE-Watchlists
- Unerledigt
IBM Security Guardium Key Lifecycle Manager 4.1, 4.1.1, 4.2.0, and 4.2.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.1.0
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.1.1
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.2.0
Ibm ≫ Security Guardium Key Lifecycle Manager Version4.2.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.187 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@us.ibm.com | 3.7 | 2.2 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-319 Cleartext Transmission of Sensitive Information
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.