First published: Thu Sep 05 2019(Updated: )
IBM Intelligent Operations Center V5.1.0 - V5.2.0, IBM Intelligent Operations Center for Emergency Management V5.1.0 - V5.1.0.6, and IBM Water Operations for Waternamics V5.1.0 - V5.2.1.1 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 161201.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Intelligent Operations Center | >=5.1.0<=5.2.0 | |
IBM Intelligent Operations Center for Emergency Management | >=5.1.0<=5.1.0.6 | |
IBM Water Operations for Waternamics | >=5.1.0<=5.2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-4321 is high with a severity value of 7.5.
IBM Intelligent Operations Center versions 5.1.0 - 5.2.0, IBM Intelligent Operations Center for Emergency Management versions 5.1.0 - 5.1.0.6, and IBM Water Operations for Waternamics versions 5.1.0 - 5.2.1.1 are affected by CVE-2019-4321.
No, IBM Intelligent Operations Center versions 5.1.0 - 5.2.0, IBM Intelligent Operations Center for Emergency Management versions 5.1.0 - 5.1.0.6, and IBM Water Operations for Waternamics versions 5.1.0 - 5.2.1.1 do not require strong passwords by default.
Attackers can exploit CVE-2019-4321 by bypassing the weak password requirement, making it easier for them to compromise the system.
You can find more information about CVE-2019-4321 on the IBM Support website at http://www.ibm.com/support/docview.wss?uid=ibm10885901 and on the IBM X-Force Exchange website at https://exchange.xforce.ibmcloud.com/vulnerabilities/161201.