Default Credential Vulnerability in IBM Sterling Connect:Direct Web Services
CVE-2024-39747
9.8CRITICAL
Key Information:
- Vendor
- IBM
- Vendor
- CVE Published:
- 31 August 2024
Summary
IBM Sterling Connect:Direct Web Services versions 6.0, 6.1, 6.2, and 6.3 are susceptible to a significant security risk due to the use of default credentials for critical functionalities. This vulnerability potentially allows unauthorized individuals to exploit these services, leading to unauthorized access and manipulation of sensitive data. Organizations utilizing these versions are strongly advised to review their security configurations and implement proper credential management practices to mitigate the associated risks.
Affected Version(s)
Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, 6.3
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published