CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
34.0%
IBM Rational ClearQuest 8.0 through 8.0.1.9 and 9.0 through 9.0.1.3 (CQ OSLC linkages, EmailRelay) fails to check the SSL certificate against the requested hostname. It is subject to a man-in-the-middle attack with an impersonating server observing all the data transmitted to the real server. IBM X-Force ID: 113353.
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | rational_clearquest | * | cpe:2.3:a:ibm:rational_clearquest:*:*:*:*:*:*:*:* |
[
{
"product": "Rational ClearQuest",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "8.0"
},
{
"status": "affected",
"version": "8.0.0.1"
},
{
"status": "affected",
"version": "8.0.0.2"
},
{
"status": "affected",
"version": "8.0.0.3"
},
{
"status": "affected",
"version": "8.0.0.4"
},
{
"status": "affected",
"version": "8.0.0.5"
},
{
"status": "affected",
"version": "8.0.0.6"
},
{
"status": "affected",
"version": "8.0.0.7"
},
{
"status": "affected",
"version": "8.0.1"
},
{
"status": "affected",
"version": "8.0.0.8"
},
{
"status": "affected",
"version": "8.0.1.1"
},
{
"status": "affected",
"version": "8.0.0.9"
},
{
"status": "affected",
"version": "8.0.0.10"
},
{
"status": "affected",
"version": "8.0.0.11"
},
{
"status": "affected",
"version": "8.0.1.2"
},
{
"status": "affected",
"version": "8.0.1.3"
},
{
"status": "affected",
"version": "8.0.1.4"
},
{
"status": "affected",
"version": "8.0.0.12"
},
{
"status": "affected",
"version": "8.0.1.5"
},
{
"status": "affected",
"version": "8.0.0.13"
},
{
"status": "affected",
"version": "8.0.1.6"
},
{
"status": "affected",
"version": "8.0.0.14"
},
{
"status": "affected",
"version": "8.0.1.7"
},
{
"status": "affected",
"version": "8.0.0.15"
},
{
"status": "affected",
"version": "8.0.1.8"
},
{
"status": "affected",
"version": "8.0.0.16"
},
{
"status": "affected",
"version": "8.0.1.9"
},
{
"status": "affected",
"version": "8.0.0.17"
},
{
"status": "affected",
"version": "8.0.1.10"
},
{
"status": "affected",
"version": "8.0.0.18"
},
{
"status": "affected",
"version": "8.0.1.11"
},
{
"status": "affected",
"version": "9.0"
},
{
"status": "affected",
"version": "9.0.0.1"
},
{
"status": "affected",
"version": "8.0.0.19"
},
{
"status": "affected",
"version": "8.0.1.12"
},
{
"status": "affected",
"version": "9.0.0.2"
},
{
"status": "affected",
"version": "8.0.0.20"
},
{
"status": "affected",
"version": "8.0.1.13"
},
{
"status": "affected",
"version": "9.0.0.3"
},
{
"status": "affected",
"version": "8.0.0.21"
},
{
"status": "affected",
"version": "8.0.1.14"
},
{
"status": "affected",
"version": "9.0.0.4"
},
{
"status": "affected",
"version": "9.0.1"
},
{
"status": "affected",
"version": "8.0.1.15"
},
{
"status": "affected",
"version": "9.0.0.5"
},
{
"status": "affected",
"version": "9.0.1.1"
},
{
"status": "affected",
"version": "8.0.1.16"
},
{
"status": "affected",
"version": "9.0.0.6"
},
{
"status": "affected",
"version": "9.0.1.2"
},
{
"status": "affected",
"version": "8.0.1.17"
},
{
"status": "affected",
"version": "9.0.1.3"
}
]
}
]
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
34.0%