First published: Wed Jul 15 2020(Updated: )
IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 179478.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Verify Gateway | =1.0.0 | |
IBM Verify Gateway | =1.0.1 | |
<=RADIUS 1.0.0 | ||
<=PAM 1.0.0, 1.0.1 | ||
<=WinLogin 1.0.0, 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-4400.
The severity level of CVE-2020-4400 is high (7.5).
IBM Verify Gateway (IVG) versions 1.0.0 and 1.0.1, as well as RADIUS 1.0.0, PAM 1.0.0, and WinLogin 1.0.0 and 1.0.1 are affected by CVE-2020-4400.
CVE-2020-4400 is a vulnerability in IBM Verify Gateway (IVG) that uses an inadequate account lockout setting, potentially allowing a remote attacker to brute force account credentials.
You can find more information about CVE-2020-4400 on the IBM X-Force website: https://exchange.xforce.ibmcloud.com/vulnerabilities/179478