First published: Mon Oct 28 2013(Updated: )
The Jazz Team Server component in IBM Security AppScan Enterprise 8.x before 8.8 has a default username and password, which makes it easier for remote authenticated users to obtain unspecified access to this component by leveraging this credential information in an environment with applicable component installation details.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security AppScan | =8.0.0.0 | |
IBM Security AppScan | =8.0.0.1 | |
IBM Security AppScan | =8.0.0.2 | |
IBM Security AppScan | =8.0.1.0 | |
IBM Security AppScan | =8.0.1.1 | |
IBM Security AppScan | =8.0.11 | |
IBM Security AppScan | =8.5.0.0 | |
IBM Security AppScan | =8.5.0.1 | |
IBM Security AppScan | =8.6.0.0 | |
IBM Security AppScan | =8.6.0.1 | |
IBM Security AppScan | =8.6.0.2 | |
IBM Security AppScan | =8.7.0.0 | |
IBM Security AppScan | =8.7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5430 has a medium severity rating due to the use of default credentials in IBM Security AppScan Enterprise.
To mitigate CVE-2013-5430, you should change the default username and password to stronger, unique credentials.
CVE-2013-5430 affects multiple versions of IBM Security AppScan Enterprise, specifically versions 8.0.0.0 through 8.7.0.1.
Yes, CVE-2013-5430 can be exploited by remote authenticated users who have access to the default credentials.
The vulnerable component in CVE-2013-5430 is the Jazz Team Server within IBM Security AppScan Enterprise.