Weak Password Enforcement in IBM QRadar Network Packet Capture
CVE-2019-4576
5.9MEDIUM
Key Information:
- Vendor
- IBM
- Vendor
- CVE Published:
- 10 June 2020
Summary
IBM QRadar Network Packet Capture versions 7.3.0 to 7.3.3 Patch 1 and version 7.4.0 GA are affected by a vulnerability that defaults to weak password requirements. This insufficient password strength allows attackers to easily compromise user accounts, posing a significant risk to network security. It is crucial for users of these versions to strengthen their password policies to prevent unauthorized access.
Affected Version(s)
QRadar Network Packet Capture Software 7.3
QRadar Network Packet Capture Software 7.3.3.Patch1
QRadar Network Packet Capture Software 7.4
References
CVSS V3.1
Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved