First published: Thu Aug 26 2021(Updated: )
IBM Sterling Secure Proxy 6.0.1, 6.0.2, 2.4.3.2, and 3.4.3.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-ForceID: 201100.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling External Authentication Server | =2.4.3.2 | |
IBM Sterling External Authentication Server | =6.0.1.0 | |
IBM Sterling External Authentication Server | =6.0.2.0 | |
IBM Sterling Secure Proxy | =3.4.3.2 | |
IBM Sterling Secure Proxy | =6.0.1 | |
IBM Sterling Secure Proxy | =6.0.2 | |
HP HP-UX | ||
IBM AIX | ||
Ibm Linux On Ibm Z | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Oracle Solaris | ||
<=6.0.2 | ||
<=6.0.1 | ||
<=2.4.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29723 is a vulnerability in IBM Sterling Secure Proxy that uses weaker than expected cryptographic algorithms, allowing an attacker to decrypt sensitive information.
IBM Sterling Secure Proxy versions 6.0.1, 6.0.2, 2.4.3.2, and 3.4.3.2 are affected by CVE-2021-29723.
CVE-2021-29723 has a severity rating of 7.5 (high).
An attacker can exploit CVE-2021-29723 by using weaker cryptographic algorithms to decrypt highly sensitive information.
To fix CVE-2021-29723, update IBM Sterling Secure Proxy to a version that uses stronger cryptographic algorithms.