First published: Thu Nov 07 2024(Updated: )
IBM Security Guardium Key Lifecycle Manager 4.1, 4.1.1, 4.2.0, and 4.2.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Guardium Key Lifecycle Manager | <=4.1, 4.1.1, 4.2, 4.2.1 | |
IBM Security Guardium Key Lifecycle Manager | =4.1.0 | |
IBM Security Guardium Key Lifecycle Manager | =4.1.1 | |
IBM Security Guardium Key Lifecycle Manager | =4.2.0 | |
IBM Security Guardium Key Lifecycle Manager | =4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49818 is classified as a moderate severity vulnerability due to its potential to expose sensitive information.
To mitigate CVE-2024-49818, upgrade IBM Security Guardium Key Lifecycle Manager to the latest version that addresses this vulnerability.
CVE-2024-49818 affects versions 4.1, 4.1.1, 4.2.0, and 4.2.1 of IBM Security Guardium Key Lifecycle Manager.
CVE-2024-49818 could allow a remote attacker to obtain sensitive information from detailed technical error messages returned by the application.
If upgrading is not possible, ensure that sensitive error messages are not revealed to users and consider additional security controls.