Insecure Protocols in IBM Security Verify Access Could Lead to Server Takeover
CVE-2023-32328
9.8CRITICAL
Key Information:
- Vendor
- IBM
- Vendor
- CVE Published:
- 7 February 2024
Summary
IBM Security Verify Access versions 10.0.0.0 through 10.0.6.1 contain a vulnerability due to the use of insecure protocols. This could enable an unauthorized attacker on the network to gain control of the server, potentially leading to unauthorized data access and manipulation. Organizations using these affected versions are advised to review their security posture and implement necessary mitigations to safeguard against potential exploits.
Affected Version(s)
Security Verify Access Appliance 10.0.0.0 <= 10.0.6.1
Security Verify Access Docker 10.0.0.0 <= 10.0.6.1
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved