First published: Thu Oct 06 2016(Updated: )
The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 before 3.4.2.0 iFix 8 and 3.4.3 before 3.4.3.0 iFix 1 allows man-in-the-middle attackers to obtain sensitive information via an HTTP method that is neither GET nor POST.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Secure Proxy | =3.4.2.0 | |
IBM Sterling Secure Proxy | =3.4.2.0-ifix1 | |
IBM Sterling Secure Proxy | =3.4.2.0-ifix2 | |
IBM Sterling Secure Proxy | =3.4.2.0-ifix3 | |
IBM Sterling Secure Proxy | =3.4.2.0-ifix4 | |
IBM Sterling Secure Proxy | =3.4.2.0-ifix5 | |
IBM Sterling Secure Proxy | =3.4.2.0-ifix6 | |
IBM Sterling Secure Proxy | =3.4.2.0-ifix7 | |
IBM Sterling Secure Proxy | =3.4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6026 is classified as a medium severity vulnerability due to the potential for man-in-the-middle attacks.
To remediate CVE-2016-6026, it's recommended to update IBM Sterling Secure Proxy to version 3.4.2.0 iFix 8 or 3.4.3.0 iFix 1 or later.
CVE-2016-6026 affects IBM Sterling Secure Proxy versions 3.4.2.0 prior to iFix 8 and versions 3.4.3.0 prior to iFix 1.
CVE-2016-6026 can be exploited by man-in-the-middle attackers to gain access to sensitive information.
Yes, CVE-2016-6026 is fixed in the latest versions 3.4.2.0 iFix 8 and 3.4.3.0 iFix 1.