First published: Fri Nov 19 2021(Updated: )
IBM Sterling Connect:Direct Web Services 1.0 and 6.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 209508.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Direct | >=6.0.0<6.2.0.1 | |
IBM AIX | ||
Linux Kernel | ||
Microsoft Windows | ||
Oracle Solaris SPARC | ||
IBM Sterling Connect:Direct | <=1.0 | |
IBM Sterling Connect:Direct | <=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38891 is considered to have a high severity due to its potential to allow attackers to decrypt sensitive information.
To fix CVE-2021-38891, upgrade IBM Sterling Connect:Direct Web Services to a version that uses stronger cryptographic algorithms.
IBM Sterling Connect:Direct Web Services versions 1.0 and 6.0 are affected by CVE-2021-38891.
Yes, CVE-2021-38891 could impact compliance with data protection laws due to its potential to expose sensitive information.
Yes, CVE-2021-38891 specifically affects IBM Sterling Connect:Direct Web Services.