First published: Wed Nov 10 2021(Updated: )
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Security Key Lifecycle Manager | <=3.0 - 3.0.0.4 | |
Ibm Security Key Lifecycle Manager | <=3.0.1 - 3.0.1.5 | |
Ibm Security Key Lifecycle Manager | <=4.0 - 4.0.0.3 | |
IBM Security Guardium Key Lifecycle Manager | <=4.1.0 - 4.1.0.1 | |
IBM Security Guardium Key Lifecycle Manager | <=4.1.1 | |
IBM Security Guardium Key Lifecycle Manager | >=4.1.0<=4.1.0.1 | |
IBM Security Guardium Key Lifecycle Manager | =4.1.1 | |
Ibm Security Key Lifecycle Manager | >=3.0<=3.0.0.4 | |
Ibm Security Key Lifecycle Manager | >=3.0.1<=3.0.1.5 | |
Ibm Security Key Lifecycle Manager | >=4.0<=4.0.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-38972.
The severity of CVE-2021-38972 is medium.
IBM Tivoli Key Lifecycle Manager versions 3.0, 3.0.1, 4.0, and 4.1, as well as IBM Security Guardium Key Lifecycle Manager versions 4.1.0 and 4.1.1 are affected by this vulnerability.
CVE-2021-38972 allows input or data to be received by the affected products without proper validation, which can result in unsafe or incorrect processing of the data.
IBM has provided fixes for the affected versions of IBM Tivoli Key Lifecycle Manager and IBM Security Guardium Key Lifecycle Manager. Users should apply the relevant patches or updates to mitigate this vulnerability.