First published: Wed Aug 21 2024(Updated: )
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Direct Web Services | <=6.3.0 | |
IBM Sterling Connect:Direct Web Services | <=6.1.0 | |
IBM Sterling Connect:Direct Web Services | <=6.2.0 | |
IBM Connect:Direct Web Services | <=6.0 | |
All of | ||
Any of | ||
IBM Sterling Connect Direct Web Services | =6.0 | |
IBM Sterling Connect Direct Web Services | =6.1.0 | |
IBM Sterling Connect Direct Web Services | =6.2.0 | |
IBM Sterling Connect Direct Web Services | =6.3.0 | |
Any of | ||
IBM AIX | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.