CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
76.0%
Keycloak vulnerability of incorrect authorization impacts Rational Test Automation Server.
CVEID:CVE-2021-4133
**DESCRIPTION:**Keycloak could allow a remote authenticated attacker to bypass security restrictions, caused by improper authorization validation by the administrative REST API. By sending a specially-crafted request using the administrative REST API, an attacker could exploit this vulnerability to create new default user accounts.
CVSS Base score: 8.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/220193 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Affected Product(s) | Version(s) |
---|---|
Rational Test Automation Server | All |
Upgrading to Rational Test Automation Server v10.5 is strongly recommended.
Customers with Rational Test Automation Server upgrade to version 10.5 from the entitlement registry.
Instructions for pulling upgraded images:
None
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | rational_test_virtualization_server | 10.5.0 | cpe:2.3:a:ibm:rational_test_virtualization_server:10.5.0:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
76.0%