IBM Security Key Lifecycle Manager uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
CVEID: CVE-2018-1751 DESCRIPTION: IBM Tivoli Key Lifecycle Manager uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
CVSS Base Score: 5.9
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/148512> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVEID: CVE-2019-4516 DESCRIPTION: IBM Tivoli Key Lifecycle Manager uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
CVSS Base Score: 5.9
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/165138> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
IBM Security Key Lifecycle Manager (SKLM) v3.0 - v3.0.0.3 on distributed platforms
IBM Security Key Lifecycle Manager (SKLM) v3.0.1- v3.0.1.2 on distributed platforms
For SKLM v3.0 - 3.0.0.3 and v3.0.1 - 3.0.1.2, if found affected, you may follow the steps below to mitigate the issue:
Use Update Config Property REST Service or tklmConfigUpdateEntry CLI to update the property “Transport.ssl.vulnerableciphers.patterns”.
Value of the property should be pattern that user wants to block.
Example :To block all the ciphers with DES , property and its value would be:
Transport.ssl.vulnerableciphers.patterns=RC4,RSA_EXPORT,DES
This will ensure that all the ciphers with DES are blocked.
CPE | Name | Operator | Version |
---|---|---|---|
ibm security key lifecycle manager | eq | 3.0 | |
ibm security key lifecycle manager | eq | 3.0.1 |