Weak Password Enforcement in IBM QRadar Network Packet Capture
CVE-2019-4576

5.9MEDIUM

Key Information:

Vendor

IBM

Vendor
CVE Published:
10 June 2020

What is CVE-2019-4576?

IBM QRadar Network Packet Capture versions 7.3.0 to 7.3.3 Patch 1 and version 7.4.0 GA are affected by a vulnerability that defaults to weak password requirements. This insufficient password strength allows attackers to easily compromise user accounts, posing a significant risk to network security. It is crucial for users of these versions to strengthen their password policies to prevent unauthorized access.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

QRadar Network Packet Capture Software 7.3

QRadar Network Packet Capture Software 7.3.3.Patch1

QRadar Network Packet Capture Software 7.4

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.