First published: Mon Feb 02 2015(Updated: )
IBM Security AppScan Standard 8.x and 9.x before 9.0.1.1 FP1 supports unencrypted sessions, which allows remote attackers to obtain sensitive information by sniffing the network.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security AppScan | =8.0.0.0 | |
IBM Security AppScan | =8.0.0.1 | |
IBM Security AppScan | =8.0.0.2 | |
IBM Security AppScan | =8.0.0.3 | |
IBM Security AppScan | =8.5.0.0 | |
IBM Security AppScan | =8.5.0.1 | |
IBM Security AppScan | =8.6.0.0 | |
IBM Security AppScan | =8.6.0.1 | |
IBM Security AppScan | =8.7.0.0 | |
IBM Security AppScan | =8.7.0.1 | |
IBM Security AppScan | =8.8.0.0 | |
IBM Security AppScan | =9.0.0.0 | |
IBM Security AppScan | =9.0.0.1 | |
IBM Security AppScan | =9.0.1.0 | |
IBM Security AppScan | =9.0.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6136 is considered a moderate severity vulnerability due to the risk of sensitive information exposure.
To fix CVE-2014-6136, upgrade IBM Security AppScan to version 9.0.1.1 FP1 or newer.
CVE-2014-6136 affects IBM Security AppScan Standard versions 8.x and 9.x before 9.0.1.1 FP1.
CVE-2014-6136 can be exploited by remote attackers through network sniffing to obtain sensitive information.
Yes, CVE-2014-6136 is a remote vulnerability that can be exploited over the network.