First published: Thu Mar 09 2023(Updated: )
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 247601.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Security Key Lifecycle Manager | =3.0 | |
Ibm Security Key Lifecycle Manager | =3.0.1 | |
Ibm Security Key Lifecycle Manager | =4.0 | |
Ibm Security Key Lifecycle Manager | =4.1 | |
Ibm Security Key Lifecycle Manager | =4.1.1 | |
<=3.0 | ||
<=3.0.1 | ||
<=4.0 | ||
<=4.1 | ||
<=4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-25686 is medium.
CVE-2023-25686 allows a local user to read user credentials stored in plain clear text in IBM Security Guardium Key Lifecycle Manager.
Versions 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 of IBM Security Guardium Key Lifecycle Manager are affected by CVE-2023-25686.
A local user can exploit CVE-2023-25686 by reading user credentials stored in plain clear text in IBM Security Guardium Key Lifecycle Manager.
To fix CVE-2023-25686, upgrade to a version of IBM Security Guardium Key Lifecycle Manager that does not store user credentials in plain clear text.