First published: Sat Oct 22 2016(Updated: )
IBM Security Guardium Database Activity Monitor 8.2 before p310, 9.x through 9.5 before p700, and 10.x through 10.1 before p100 does not enable the HSTS protection mechanism, which makes it easier for remote attackers to obtain sensitive information by leveraging use of HTTP.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium Database Activity Monitoring | =8.2 | |
IBM InfoSphere Guardium Database Activity Monitoring | =9.0 | |
IBM InfoSphere Guardium Database Activity Monitoring | =9.1 | |
IBM InfoSphere Guardium Database Activity Monitoring | =9.5 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.0 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.1 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-0240 is rated as medium due to its potential impact on sensitive information exposure.
To fix CVE-2016-0240, you should update IBM Security Guardium Database Activity Monitor to the latest version that enables HSTS.
CVE-2016-0240 affects IBM Security Guardium Database Activity Monitor versions 8.2 before p310, 9.x through 9.5 before p700, and 10.x through 10.1 before p100.
If CVE-2016-0240 is present in your system, you should immediately plan to apply the necessary security updates.
HSTS is important because it helps to prevent man-in-the-middle attacks that can exploit the vulnerability described in CVE-2016-0240.