First published: Fri Nov 26 2021(Updated: )
IBM QRadar could allow an attacker to obtain sensitive information due to the server performing key exchange without entity authentication on inter-host communications using man in the middle techniques.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Security Information and Event Manager | >=7.3.0<=7.3.3 | |
IBM QRadar Security Information and Event Manager | >=7.4.0<=7.4.3 | |
IBM QRadar Security Information and Event Manager | =7.3.3-fix_pack_1 | |
IBM QRadar Security Information and Event Manager | =7.3.3-fix_pack_2 | |
IBM QRadar Security Information and Event Manager | =7.3.3-fix_pack_3 | |
IBM QRadar Security Information and Event Manager | =7.3.3-fix_pack_4 | |
IBM QRadar Security Information and Event Manager | =7.3.3-fix_pack_5 | |
IBM QRadar Security Information and Event Manager | =7.3.3-fix_pack_6 | |
IBM QRadar Security Information and Event Manager | =7.3.3-fix_pack_7 | |
IBM QRadar Security Information and Event Manager | =7.3.3-fix_pack_8 | |
IBM QRadar Security Information and Event Manager | =7.3.3-fix_pack_9 | |
IBM QRadar Security Information and Event Manager | =7.4.2-fix_pack_1 | |
IBM QRadar Security Information and Event Manager | =7.4.3-fix_pack_1 | |
IBM QRadar Security Information and Event Manager | =7.4.3-fix_pack_2 | |
IBM QRadar Security Information and Event Manager | =7.4.3-fix_pack_3 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29779 has been classified with a medium severity level due to the possibility of sensitive information exposure.
To fix CVE-2021-29779, it is recommended to update IBM QRadar Security Information and Event Manager to the latest available fix packs.
CVE-2021-29779 affects IBM QRadar versions 7.3 and 7.4, specifically versions prior to 7.3.3 and 7.4.3 respectively.
CVE-2021-29779 is associated with man-in-the-middle attacks that can exploit insecure key exchange processes.
CVE-2021-29779 may be considered relatively easy to exploit for attackers with access to the network where affected systems reside.