First published: Thu Aug 26 2021(Updated: )
IBM Sterling Secure Proxy 6.0.1, 6.0.2, 2.4.3.2, and 3.4.3.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 201095.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling External Authentication Server | =2.4.3.2 | |
IBM Sterling External Authentication Server | =6.0.1.0 | |
IBM Sterling External Authentication Server | =6.0.2.0 | |
IBM Sterling Secure Proxy | =3.4.3.2 | |
IBM Sterling Secure Proxy | =6.0.1 | |
IBM Sterling Secure Proxy | =6.0.2 | |
HP HP-UX | ||
IBM AIX | ||
Ibm Linux On Ibm Z | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Oracle Solaris | ||
<=6.0.2 | ||
<=6.0.1 | ||
<=2.4.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-29722.
The severity level of CVE-2021-29722 is high (7.5).
IBM Sterling External Authentication Server versions 2.4.3.2, 6.0.1.0, and 6.0.2.0, as well as IBM Sterling Secure Proxy versions 3.4.3.2, 6.0.1, and 6.0.2 are affected by CVE-2021-29722.
CVE-2021-29722 could allow an attacker to decrypt highly sensitive information.
To fix CVE-2021-29722, apply the patches provided by IBM for the affected products.