First published: Wed May 02 2018(Updated: )
IBM Security Guardium 10.0, 10.0.1, and 10.1 through 10.1.4 Database Activity Monitor does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 132624.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium Database Activity Monitoring | =10.0 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.0.1 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.1 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.1.2 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.1.3 | |
IBM InfoSphere Guardium Database Activity Monitoring | =10.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1601 has a medium severity rating due to the potential for user account compromise.
To fix CVE-2017-1601, ensure that strong password policies are enforced for all user accounts in IBM Security Guardium.
CVE-2017-1601 affects IBM Security Guardium versions 10.0, 10.0.1, and 10.1 through 10.1.4.
Organizations using the affected versions of IBM Security Guardium may be vulnerable to account compromises.
If upgrading is not possible, implement strict password controls and monitoring to mitigate the risk from CVE-2017-1601.