Lucene search

K
cve[email protected]CVE-2017-1476
HistoryJun 06, 2018 - 5:29 p.m.

CVE-2017-1476

2018-06-0617:29:00
CWE-200
web.nvd.nist.gov
22
ibm
security access manager
appliance
cve-2017-1476
http strict transport security
information security

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.0%

IBM Security Access Manager Appliance 7.0.0, 8.0.0 through 8.0.1.6, and 9.0.0 through 9.0.3.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 128610.

Affected configurations

Vulners
NVD
Node
ibmsecurity_access_managerMatch9.0.0.1
OR
ibmsecurity_access_managerMatch7.0.0
OR
ibmsecurity_access_managerMatch8.0.0
OR
ibmsecurity_access_managerMatch8.0.0.1
OR
ibmsecurity_access_managerMatch8.0.0.2
OR
ibmsecurity_access_managerMatch8.0.0.3
OR
ibmsecurity_access_managerMatch8.0.0.4
OR
ibmsecurity_access_managerMatch8.0.0.5
OR
ibmsecurity_access_managerMatch8.0.1
OR
ibmsecurity_access_managerMatch8.0.1.2
OR
ibmsecurity_access_managerMatch8.0.1.3
OR
ibmsecurity_access_managerMatch8.0.1.4
OR
ibmsecurity_access_managerMatch9.0.0
OR
ibmsecurity_access_managerMatch9.0.1.0
OR
ibmsecurity_access_managerMatch9.0.2.0
OR
ibmsecurity_access_managerMatch8.0.1.5
OR
ibmsecurity_access_managerMatch9.0.2.1
OR
ibmsecurity_access_managerMatch9.0.3
OR
ibmsecurity_access_managerMatch9.0.3.1
OR
ibmsecurity_access_managerMatch8.0.1.6
VendorProductVersionCPE
ibmsecurity_access_manager9.0.0.1cpe:2.3:a:ibm:security_access_manager:9.0.0.1:*:*:*:*:*:*:*
ibmsecurity_access_manager7.0.0cpe:2.3:a:ibm:security_access_manager:7.0.0:*:*:*:*:*:*:*
ibmsecurity_access_manager8.0.0cpe:2.3:a:ibm:security_access_manager:8.0.0:*:*:*:*:*:*:*
ibmsecurity_access_manager8.0.0.1cpe:2.3:a:ibm:security_access_manager:8.0.0.1:*:*:*:*:*:*:*
ibmsecurity_access_manager8.0.0.2cpe:2.3:a:ibm:security_access_manager:8.0.0.2:*:*:*:*:*:*:*
ibmsecurity_access_manager8.0.0.3cpe:2.3:a:ibm:security_access_manager:8.0.0.3:*:*:*:*:*:*:*
ibmsecurity_access_manager8.0.0.4cpe:2.3:a:ibm:security_access_manager:8.0.0.4:*:*:*:*:*:*:*
ibmsecurity_access_manager8.0.0.5cpe:2.3:a:ibm:security_access_manager:8.0.0.5:*:*:*:*:*:*:*
ibmsecurity_access_manager8.0.1cpe:2.3:a:ibm:security_access_manager:8.0.1:*:*:*:*:*:*:*
ibmsecurity_access_manager8.0.1.2cpe:2.3:a:ibm:security_access_manager:8.0.1.2:*:*:*:*:*:*:*
Rows per page:
1-10 of 201

CNA Affected

[
  {
    "product": "Security Access Manager",
    "vendor": "IBM",
    "versions": [
      {
        "status": "affected",
        "version": "9.0.0.1"
      },
      {
        "status": "affected",
        "version": "7.0.0"
      },
      {
        "status": "affected",
        "version": "8.0.0"
      },
      {
        "status": "affected",
        "version": "8.0.0.1"
      },
      {
        "status": "affected",
        "version": "8.0.0.2"
      },
      {
        "status": "affected",
        "version": "8.0.0.3"
      },
      {
        "status": "affected",
        "version": "8.0.0.4"
      },
      {
        "status": "affected",
        "version": "8.0.0.5"
      },
      {
        "status": "affected",
        "version": "8.0.1"
      },
      {
        "status": "affected",
        "version": "8.0.1.2"
      },
      {
        "status": "affected",
        "version": "8.0.1.3"
      },
      {
        "status": "affected",
        "version": "8.0.1.4"
      },
      {
        "status": "affected",
        "version": "9.0.0"
      },
      {
        "status": "affected",
        "version": "9.0.1.0"
      },
      {
        "status": "affected",
        "version": "9.0.2.0"
      },
      {
        "status": "affected",
        "version": "8.0.1.5"
      },
      {
        "status": "affected",
        "version": "9.0.2.1"
      },
      {
        "status": "affected",
        "version": "9.0.3"
      },
      {
        "status": "affected",
        "version": "9.0.3.1"
      },
      {
        "status": "affected",
        "version": "8.0.1.6"
      }
    ]
  }
]

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.0%

Related for CVE-2017-1476