First published: Fri Nov 19 2021(Updated: )
IBM Sterling Connect:Direct Web Services 1.0 and 6.0 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 209507.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Direct | >=6.0.0<6.2.0.1 | |
IBM AIX | ||
Linux Kernel | ||
Microsoft Windows | ||
Oracle Solaris SPARC | ||
IBM Sterling Connect:Direct | <=1.0 | |
IBM Sterling Connect:Direct | <=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38890 has been classified with a medium severity level due to its potential for brute force attacks.
To remediate CVE-2021-38890, you should configure stronger account lockout policies in IBM Sterling Connect:Direct Web Services.
CVE-2021-38890 affects IBM Sterling Connect:Direct Web Services versions 1.0 and 6.0.
Yes, a remote attacker can exploit CVE-2021-38890 to brute force account credentials.
Implementing stricter account lockout policies serves as a temporary workaround for CVE-2021-38890.