fkie_cve-2021-39082
Vulnerability from fkie_nvd
Published
2022-04-29 16:15
Modified
2024-11-21 06:18
Summary
IBM UrbanCode Deploy (UCD) 7.1.1.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Impacted products
Vendor Product Version
ibm urbancode_deploy 7.0.3.4.1044170
ibm urbancode_deploy 7.0.4.1.1036185
ibm urbancode_deploy 7.0.4.2.1038002
ibm urbancode_deploy 7.0.4.3.1044169
ibm urbancode_deploy 7.0.5.0.1041488
ibm urbancode_deploy 7.0.5.1.1044461
ibm urbancode_deploy 7.0.5.2.1050384
ibm urbancode_deploy 7.1.0.0.1058690
ibm urbancode_deploy 7.1.0.1.1061360
ibm urbancode_deploy 7.1.0.1.ifix01.1062130
ibm urbancode_deploy 7.1.0.2.1063225
ibm urbancode_deploy 7.1.0.3.1069281
ibm urbancode_deploy 7.1.1.0.1073118
ibm urbancode_deploy 7.1.1.1.1074331
ibm urbancode_deploy 7.1.1.2.1090482
ibm urbancode_deploy 7.1.2.0.1100493
ibm urbancode_deploy 7.1.2.1.1104332
ibm urbancode_deploy 7.2.0.0.1109832
ibm urbancode_deploy 7.2.0.1.1114184
ibm urbancode_deploy 7.2.0.2.1116435
ibm urbancode_deploy 7.2.1.0.1123293



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.0.3.4.1044170:*:*:*:*:*:*:*",
              "matchCriteriaId": "75E707C1-0F38-46CF-A9F9-71E786C1E513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.0.4.1.1036185:*:*:*:*:*:*:*",
              "matchCriteriaId": "C77C75A2-0075-4D02-8006-D6A73084F7D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.0.4.2.1038002:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB879945-5793-462E-B4D9-1C5C57EF015A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.0.4.3.1044169:*:*:*:*:*:*:*",
              "matchCriteriaId": "17E66571-C096-4842-A354-15B983AD6266",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.0.5.0.1041488:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0DE5BE2-2E55-490C-8D3F-4ABDABC0F205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.0.5.1.1044461:*:*:*:*:*:*:*",
              "matchCriteriaId": "07BE2519-7694-4612-BB9C-0BF899B76A84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.0.5.2.1050384:*:*:*:*:*:*:*",
              "matchCriteriaId": "770D8345-44C5-48DF-8F74-865E0155D0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.1.0.0.1058690:*:*:*:*:*:*:*",
              "matchCriteriaId": "C398510B-8381-4488-B99A-1F1C365D633A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.1.0.1.1061360:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DBFDC1E-02C4-433A-A5FE-7A65CC9579A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.1.0.1.ifix01.1062130:*:*:*:*:*:*:*",
              "matchCriteriaId": "E58B96F9-5C53-4F63-87A2-348A96B671B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.1.0.2.1063225:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EFAA45-D454-44A0-8BD8-0B9527D0CD38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.1.0.3.1069281:*:*:*:*:*:*:*",
              "matchCriteriaId": "17EDE7F4-A63D-4CB0-A856-FFB8974F4B3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.1.1.0.1073118:*:*:*:*:*:*:*",
              "matchCriteriaId": "951808A4-184E-494F-9287-BF131C857379",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.1.1.1.1074331:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1BD8F5-F576-4272-A46F-BC31FF0FA001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.1.1.2.1090482:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9595657-9472-4F96-96FD-A3CC38A89D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.1.2.0.1100493:*:*:*:*:*:*:*",
              "matchCriteriaId": "144CF629-71D8-4D68-AA2E-7FF3106F3F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.1.2.1.1104332:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A6544A8-84F3-48BB-A7D1-37B27F4D7BF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.2.0.0.1109832:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ED4C206-1343-4C03-9FD8-5D7CC43E694C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.2.0.1.1114184:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BECCA4D-51BB-4153-BF6B-58D2BCD38CD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.2.0.2.1116435:*:*:*:*:*:*:*",
              "matchCriteriaId": "89C34388-767E-450D-A753-FF0100F466FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:urbancode_deploy:7.2.1.0.1123293:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E31C334-97F3-4A1A-ACC5-F05654123065",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM UrbanCode Deploy (UCD) 7.1.1.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information."
    },
    {
      "lang": "es",
      "value": "IBM UrbanCode Deploy (UCD) versi\u00f3n 7.1.1.2, usa algoritmos criptogr\u00e1ficos m\u00e1s d\u00e9biles de lo esperado que podr\u00edan permitir a un atacante descifrar informaci\u00f3n altamente confidencial"
    }
  ],
  "id": "CVE-2021-39082",
  "lastModified": "2024-11-21T06:18:33.990",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "psirt@us.ibm.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-29T16:15:07.907",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Broken Link",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/215693"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.ibm.com/support/pages/node/6576179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/215693"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.ibm.com/support/pages/node/6576179"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…