Weak Password Enforcement in IBM QRadar Network Packet Capture
CVE-2019-4576

5.9MEDIUM

Key Information:

Vendor
IBM
Vendor
CVE Published:
10 June 2020

Summary

IBM QRadar Network Packet Capture versions 7.3.0 to 7.3.3 Patch 1 and version 7.4.0 GA are affected by a vulnerability that defaults to weak password requirements. This insufficient password strength allows attackers to easily compromise user accounts, posing a significant risk to network security. It is crucial for users of these versions to strengthen their password policies to prevent unauthorized access.

Affected Version(s)

QRadar Network Packet Capture Software 7.3

QRadar Network Packet Capture Software 7.3.3.Patch1

QRadar Network Packet Capture Software 7.4

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.