First published: Thu Aug 22 2024(Updated: )
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
IBM Sterling Connect:Direct | =6.0 | |
IBM Sterling Connect:Direct | =6.1.0 | |
IBM Sterling Connect:Direct | =6.2.0 | |
IBM Sterling Connect:Direct | =6.3.0 | |
Any of | ||
IBM AIX | ||
Linux Kernel | ||
Microsoft Windows | ||
IBM Sterling Connect:Direct | <=6.3.0 | |
IBM Sterling Connect:Direct | <=6.1.0 | |
IBM Sterling Connect:Direct | <=6.2.0 | |
IBM Sterling Connect:Direct | <=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.