First published: Fri Apr 09 2021(Updated: )
IBM Jazz Foundation uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM RDNG | <=6.0.2 | |
IBM DOORS Next | <=7.0.2 | |
IBM DOORS Next | <=7.0 | |
IBM DOORS Next | <=7.0.1 | |
IBM RDNG | <=6.0.6.1 | |
IBM RDNG | <=6.0.6 | |
IBM RQM | <=6.0.6.1 | |
IBM ETM | <=7.0.1 | |
IBM RQM | <=6.0.6 | |
IBM ETM | <=7.0.0 | |
IBM RQM | <=6.0.2 | |
IBM ETM | <=7.0.2 | |
IBM Removable Media Manager | <=7.0.1 | |
IBM Rhapsody Model Manager | <=6.0.6 | |
IBM Removable Media Manager | <=6.0.6.1 | |
IBM Rhapsody Model Manager | <=6.0.2 | |
IBM Removable Media Manager | <=6.0.6 | |
IBM Rhapsody Model Manager | <=6.0.6.1 | |
IBM Removable Media Manager | <=7.0 | |
IBM Removable Media Manager | <=6.0.2 | |
IBM EWM | <=7.0.1 | |
IBM RTC | <=6.0.2 | |
IBM RTC | <=6.0.6.1 | |
IBM EWM | <=7.0 | |
IBM RTC | <=6.0.6 | |
IBM EWM | <=7.0.2 | |
IBM CLM | <=6.0.6.1 | |
IBM CLM | <=6.0.6 | |
IBM ELM | <=7.0 | |
IBM CLM | <=6.0.2 | |
IBM ELM | <=7.0.1 | |
IBM ELM | <=7.0.2 | |
IBM RELM | <=6.0.6.1 | |
IBM ENI | <=7.0.1 | |
IBM RELM | <=6.0.6 | |
IBM ENI | <=7.0 | |
IBM RELM | <=6.0.2 | |
IBM ENI | <=7.0.2 | |
IBM Collaborative Lifecycle Management | =6.0.2 | |
IBM Collaborative Lifecycle Management | =6.0.6 | |
IBM Collaborative Lifecycle Management | =6.0.6.1 | |
IBM DOORS Next | =7.0.0 | |
IBM DOORS Next | =7.0.1 | |
IBM DOORS Next | =7.0.2 | |
IBM Engineering Insights | =7.0.0 | |
IBM Engineering Insights | =7.0.1 | |
IBM Engineering Insights | =7.0.2 | |
IBM Engineering Lifecycle Manager | =7.0.0 | |
IBM Engineering Lifecycle Manager | =7.0.1 | |
IBM Engineering Lifecycle Manager | =7.0.2 | |
IBM Engineering Requirements Management DOORS Next | =6.0.2 | |
IBM Engineering Requirements Management DOORS Next | =6.0.6 | |
IBM Engineering Requirements Management DOORS Next | =6.0.6.1 | |
IBM Engineering Test Management | =7.0.0 | |
IBM Engineering Test Management | =7.0.1 | |
IBM Engineering Test Management | =7.0.2 | |
IBM Engineering Workflow Management | =7.0.0 | |
IBM Engineering Workflow Management | =7.0.1 | |
IBM Engineering Workflow Management | =7.0.2 | |
IBM Engineering Lifecycle Manager | =6.0.2 | |
IBM Engineering Lifecycle Manager | =6.0.6 | |
IBM Engineering Lifecycle Manager | =6.0.6.1 | |
IBM Rational Quality Manager | =6.0.2 | |
IBM Rational Quality Manager | =6.0.6 | |
IBM Rational Quality Manager | =6.0.6.1 | |
IBM Rational Team Concert | =6.0.2 | |
IBM Rational Team Concert | =6.0.6 | |
IBM Rational Team Concert | =6.0.6.1 | |
IBM Removable Media Management | =6.0.2 | |
IBM Removable Media Management | =6.0.6 | |
IBM Removable Media Management | =6.0.6.1 | |
IBM Removable Media Management | =7.0.0 | |
IBM Removable Media Management | =7.0.1 | |
IBM Rhapsody Model Manager | =6.0.2 | |
IBM Rhapsody Model Manager | =6.0.6 | |
IBM Rhapsody Model Manager | =6.0.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4965 is classified as a medium severity vulnerability due to its potential to allow decryption of sensitive information.
To fix CVE-2020-4965, upgrade to the appropriate patched version of the affected IBM products listed in the vulnerability details.
CVE-2020-4965 affects several IBM products including IBM RDNG, IBM DOORS Next, and IBM RQM among others.
The potential impacts of CVE-2020-4965 include unauthorized decryption of highly sensitive information, posing a risk to data confidentiality.
While the best approach is to apply patches, consult IBM support for possible temporary workarounds to mitigate the impact of CVE-2020-4965.