First published: Thu Nov 11 2021(Updated: )
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input. IBM X-Force ID: 212785.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Security Key Lifecycle Manager | <=3.0 - 3.0.0.4 | |
Ibm Security Key Lifecycle Manager | <=3.0.1 - 3.0.1.5 | |
Ibm Security Key Lifecycle Manager | <=4.0 - 4.0.0.3 | |
IBM Security Guardium Key Lifecycle Manager | <=4.1.0 - 4.1.0.1 | |
IBM Security Guardium Key Lifecycle Manager | <=4.1.1 | |
IBM Security Guardium Key Lifecycle Manager | =4.1.0 | |
IBM Security Guardium Key Lifecycle Manager | =4.1.0.1 | |
IBM Security Guardium Key Lifecycle Manager | =4.1.1 | |
Ibm Security Key Lifecycle Manager | >=3.0<=3.0.0.4 | |
Ibm Security Key Lifecycle Manager | >=3.0.1<=3.0.1.5 | |
Ibm Security Key Lifecycle Manager | >=4.0<=4.0.0.3 | |
Ibm Security Key Lifecycle Manager | =4.1.0 | |
Ibm Security Key Lifecycle Manager | =4.1.0.1 | |
Ibm Security Key Lifecycle Manager | =4.1.1 | |
IBM AIX | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38979 is a vulnerability in IBM Tivoli Key Lifecycle Manager that allows the reversal of a one-way cryptographic hash without using a salt.
IBM Tivoli Key Lifecycle Manager uses a one-way cryptographic hash against an input that should not be reversible, such as a password.
Versions 3.0 - 3.0.0.4, 3.0.1 - 3.0.1.5, 4.0 - 4.0.0.3, 4.1.0 - 4.1.0.1, and 4.1.1 of IBM Tivoli Key Lifecycle Manager are affected by CVE-2021-38979.
CVE-2021-38979 has a severity rating of 7.5 (high).
More information about CVE-2021-38979 can be found at the following links: [Link 1](https://exchange.xforce.ibmcloud.com/vulnerabilities/212785) and [Link 2](https://www.ibm.com/support/pages/node/6516034).