CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
AI Score
Confidence
High
EPSS
Percentile
34.0%
IBM Rational ClearQuest 8.0 through 8.0.1.9 and 9.0 through 9.0.1.3 (CQ OSLC linkages, EmailRelay) fails to check the SSL certificate against the requested hostname. It is subject to a man-in-the-middle attack with an impersonating server observing all the data transmitted to the real server. IBM X-Force ID: 113353.
[
{
"product": "Rational ClearQuest",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "8.0"
},
{
"status": "affected",
"version": "8.0.0.1"
},
{
"status": "affected",
"version": "8.0.0.2"
},
{
"status": "affected",
"version": "8.0.0.3"
},
{
"status": "affected",
"version": "8.0.0.4"
},
{
"status": "affected",
"version": "8.0.0.5"
},
{
"status": "affected",
"version": "8.0.0.6"
},
{
"status": "affected",
"version": "8.0.0.7"
},
{
"status": "affected",
"version": "8.0.1"
},
{
"status": "affected",
"version": "8.0.0.8"
},
{
"status": "affected",
"version": "8.0.1.1"
},
{
"status": "affected",
"version": "8.0.0.9"
},
{
"status": "affected",
"version": "8.0.0.10"
},
{
"status": "affected",
"version": "8.0.0.11"
},
{
"status": "affected",
"version": "8.0.1.2"
},
{
"status": "affected",
"version": "8.0.1.3"
},
{
"status": "affected",
"version": "8.0.1.4"
},
{
"status": "affected",
"version": "8.0.0.12"
},
{
"status": "affected",
"version": "8.0.1.5"
},
{
"status": "affected",
"version": "8.0.0.13"
},
{
"status": "affected",
"version": "8.0.1.6"
},
{
"status": "affected",
"version": "8.0.0.14"
},
{
"status": "affected",
"version": "8.0.1.7"
},
{
"status": "affected",
"version": "8.0.0.15"
},
{
"status": "affected",
"version": "8.0.1.8"
},
{
"status": "affected",
"version": "8.0.0.16"
},
{
"status": "affected",
"version": "8.0.1.9"
},
{
"status": "affected",
"version": "8.0.0.17"
},
{
"status": "affected",
"version": "8.0.1.10"
},
{
"status": "affected",
"version": "8.0.0.18"
},
{
"status": "affected",
"version": "8.0.1.11"
},
{
"status": "affected",
"version": "9.0"
},
{
"status": "affected",
"version": "9.0.0.1"
},
{
"status": "affected",
"version": "8.0.0.19"
},
{
"status": "affected",
"version": "8.0.1.12"
},
{
"status": "affected",
"version": "9.0.0.2"
},
{
"status": "affected",
"version": "8.0.0.20"
},
{
"status": "affected",
"version": "8.0.1.13"
},
{
"status": "affected",
"version": "9.0.0.3"
},
{
"status": "affected",
"version": "8.0.0.21"
},
{
"status": "affected",
"version": "8.0.1.14"
},
{
"status": "affected",
"version": "9.0.0.4"
},
{
"status": "affected",
"version": "9.0.1"
},
{
"status": "affected",
"version": "8.0.1.15"
},
{
"status": "affected",
"version": "9.0.0.5"
},
{
"status": "affected",
"version": "9.0.1.1"
},
{
"status": "affected",
"version": "8.0.1.16"
},
{
"status": "affected",
"version": "9.0.0.6"
},
{
"status": "affected",
"version": "9.0.1.2"
},
{
"status": "affected",
"version": "8.0.1.17"
},
{
"status": "affected",
"version": "9.0.1.3"
}
]
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
AI Score
Confidence
High
EPSS
Percentile
34.0%