First published: Fri Aug 30 2024(Updated: )
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses default credentials for potentially critical functionality.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Direct | <=6.3.0 | |
IBM Sterling Connect:Direct | <=6.1.0 | |
IBM Sterling Connect:Direct | <=6.2.0 | |
IBM Sterling Connect:Direct | <=6.0 | |
All of | ||
Any of | ||
IBM Sterling Connect:Direct | >=6.0.0.0<6.1.0.25 | |
IBM Sterling Connect:Direct | >=6.2.0<6.2.0.24 | |
IBM Sterling Connect:Direct | >=6.3.0<6.3.0.9 | |
Any of | ||
IBM AIX | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39747 has the potential to be critical due to the use of default credentials for significant functionality.
To mitigate CVE-2024-39747, change the default credentials and apply the latest security patches provided by IBM.
CVE-2024-39747 affects IBM Sterling Connect:Direct Web Services versions 6.0, 6.1, 6.2, and 6.3.
CVE-2024-39747 poses risks of unauthorized access and potential data breaches due to default credential usage.
You can verify vulnerability to CVE-2024-39747 by checking if you are using affected versions of IBM Sterling Connect:Direct Web Services with default credentials.