First published: Tue Jun 02 2020(Updated: )
IBM Security Guardium 11.1 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 174857.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium z/OS | =11.1 | |
IBM InfoSphere Guardium z/OS | <=10.5 | |
IBM InfoSphere Guardium z/OS | <=10.6 | |
IBM InfoSphere Guardium z/OS | <=11.0 | |
IBM InfoSphere Guardium z/OS | <=11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4193 has a moderate severity rating, indicating that it could allow attackers to exploit account credentials through brute force.
To mitigate CVE-2020-4193, implement stronger account lockout settings and enhance password complexity requirements.
CVE-2020-4193 affects IBM Security Guardium versions 10.5, 10.6, 11.0, and 11.1.
Yes, CVE-2020-4193 can be exploited remotely by attackers to perform brute force attacks.
Failing to address CVE-2020-4193 can lead to unauthorized access to sensitive data due to compromised account credentials.