First published: Mon Jun 08 2020(Updated: )
IBM QRadar Network Packet Capture 7.3.0 - 7.3.3 Patch 1 and 7.4.0 GA does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 166803.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Network Packet Capture | >=7.3.0<7.3.2 | |
IBM QRadar Network Packet Capture | =7.3.2 | |
IBM QRadar Network Packet Capture | =7.3.2-patch_1 | |
IBM QRadar Network Packet Capture | =7.3.2-patch_2 | |
IBM QRadar Network Packet Capture | =7.3.2-patch_3 | |
IBM QRadar Network Packet Capture | =7.3.2-patch_4 | |
IBM QRadar Network Packet Capture | =7.3.3 | |
IBM QRadar Network Packet Capture | =7.3.3-patch_1 | |
IBM QRadar Network Packet Capture | =7.4.0 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-4576 has a high severity rating due to the lack of strong password requirements, making user accounts more susceptible to compromise.
To mitigate CVE-2019-4576, enable strong password policies within the IBM QRadar Network Packet Capture configuration.
CVE-2019-4576 affects IBM QRadar Network Packet Capture versions 7.3.0 to 7.3.3 Patch 1 and version 7.4.0 GA.
The risks associated with CVE-2019-4576 include unauthorized access and control over sensitive network data, leading to potential data breaches.
Currently, there is no specific workaround for CVE-2019-4576 other than implementing strong password policies immediately.