First published: Fri Oct 25 2024(Updated: )
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could disclose sensitive IP address information to authenticated users in responses that could be used in further attacks against the system.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Direct | <=6.3.0 | |
IBM Sterling Connect:Direct | <=6.1.0 | |
IBM Sterling Connect:Direct | <=6.2.0 | |
IBM Sterling Connect:Direct | <=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-45653 is classified as a medium risk due to potential information disclosure vulnerabilities.
To fix CVE-2024-45653, apply the relevant patches provided by IBM for Sterling Connect:Direct Web Services versions 6.0 to 6.3.
CVE-2024-45653 could allow authenticated users to access sensitive IP address information, potentially leading to further attacks.
CVE-2024-45653 affects IBM Sterling Connect:Direct Web Services versions 6.0, 6.1, 6.2, and 6.3.
As of now, there are no publicly known exploits for CVE-2024-45653, but it poses a risk of information exposure.