Lucene search

K
ibmIBM72BE15DD10933A369D96A8279CFFA7DC740003FC90C8A685A85AAB0FF6B68BC4
HistoryJun 16, 2018 - 9:41 p.m.

Security Bulletin: Use of Hard-coded Cryptographic Key vulenrability affects IBM Security Guardium Database Activity Monitor (CVE-2016-0235)

2018-06-1621:41:32
www.ibm.com
4

0.0004 Low

EPSS

Percentile

5.1%

Summary

IBM Security Guardium Database Activity Monitor uses a hard-coded password for the which is available to the administrator or a user with root access. This password could be used across other GRUB systems.

Vulnerability Details

CVEID: CVE-2016-0235**
DESCRIPTION:** IBM Security Guardium Database Activity Monitor uses a hard-coded password for the which is available to the administrator or a user with root access. This password could be used across other GRUB systems.
CVSS Base Score: 6
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/110326&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)

Affected Products and Versions

IBM Security Guardium Database Activity Monitor V10

Remediation/Fixes

<Product

| VRMF| Remediation/First Fix
—|—|—
IBM Security Guardium Database Activity Monitor| 10| https://www-945.ibm.com/support/fixcentral/swg/selectFixes?product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard_10.0p100_GPU-May-2016-V10.1&includeSupersedes=0&source=fc

CPENameOperatorVersion
ibm security guardiumeq10.0

0.0004 Low

EPSS

Percentile

5.1%

Related for 72BE15DD10933A369D96A8279CFFA7DC740003FC90C8A685A85AAB0FF6B68BC4