First published: Tue Aug 10 2021(Updated: )
IBM Security Guardium 11.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 196279.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium z/OS | <=10.5 | |
IBM InfoSphere Guardium z/OS | <=10.6 | |
IBM InfoSphere Guardium z/OS | <=11.0 | |
IBM InfoSphere Guardium z/OS | <=11.1 | |
IBM InfoSphere Guardium z/OS | <=11.2 | |
IBM InfoSphere Guardium z/OS | <=11.3 | |
IBM InfoSphere Guardium z/OS | =11.2 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20418 has a medium severity level due to the weaker default password policies.
To fix CVE-2021-20418, enforce strong password policies and require users to set complex passwords.
CVE-2021-20418 affects IBM Security Guardium versions 10.5, 10.6, 11.0, 11.1, and 11.2.
Yes, CVE-2021-20418 can lead to user account compromise due to lack of strong password requirements.
There is no specific patch for CVE-2021-20418; users must manually implement strong password policies.