First published: Thu Aug 22 2024(Updated: )
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Direct | <=6.3.0 | |
IBM Sterling Connect:Direct | <=6.1.0 | |
IBM Sterling Connect:Direct | <=6.2.0 | |
IBM Sterling Connect:Direct | <=6.0 | |
All of | ||
Any of | ||
IBM Sterling Connect:Direct | =6.0 | |
IBM Sterling Connect:Direct | =6.1.0 | |
IBM Sterling Connect:Direct | =6.2.0 | |
IBM Sterling Connect:Direct | =6.3.0 | |
Any of | ||
IBM AIX | ||
Linux Kernel | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39745 has a high severity due to the use of weaker than expected cryptographic algorithms that can lead to data decryption by attackers.
To fix CVE-2024-39745, you should apply the latest security patch provided by IBM for Sterling Connect:Direct Web Services.
CVE-2024-39745 affects IBM Sterling Connect:Direct Web Services versions 6.0, 6.1, 6.2, and 6.3.
CVE-2024-39745 potentially exposes highly sensitive information due to the weaker cryptographic algorithms used.
Currently, the recommended approach for CVE-2024-39745 is to update to the latest version of IBM Sterling Connect:Direct Web Services as there are no workarounds provided.