- Description
- IBM Business Automation Workflow 18. 19, 20, 21, and IBM Business Process Manager 8.5 and d8.6 transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
- Source
- psirt@us.ibm.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 5.9
- Impact score
- 3.6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 3.0
- Type
- Secondary
- Base score
- 5.9
- Impact score
- 3.6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
- nvd@nist.gov
- CWE-319
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:18.0.0.0:*:*:*:-:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F6ED3777-F79B-4A0E-8E25-6721C61B54F9"
},
{
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:19.0.0.0:*:*:*:-:*:*:*",
"vulnerable": true,
"matchCriteriaId": "535AE550-01A0-447C-8894-64A93C63047C"
},
{
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:20.0.0.0:*:*:*:-:*:*:*",
"vulnerable": true,
"matchCriteriaId": "04F6CF36-B3C9-41F3-8A2F-B2E8C4FD888F"
},
{
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.0.0:*:*:*:-:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4716C07D-A372-47CC-BDE8-FEBBC8EDB919"
},
{
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:-:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2E9CEC39-C2BF-4F43-86AD-4BFBB4915DE5"
},
{
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.6.0.0:-:*:*:-:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6DE7BCD3-C969-4248-B325-8EAAE9959797"
}
],
"operator": "OR"
}
]
}
]