In one of the binary files distributed with the IBM Verify Gateway (IVG) components, it’s possible to locate a hard-coded cryptographic key that’s passed as an argument to an encryption function. As of v1.0.1 of IVG for RADIUS and IVG for AIX PAM, and v1.0.2 of IVG for Linux PAM and IVG for Windows Login, this cryptographic key is hidden from view.
CVEID:CVE-2020-4385
**DESCRIPTION:**IBM Verify Gateway (IVG) contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/179266 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM Verify Gateway (IVG) | RADIUS 1.0.0 |
IBM Verify Gateway (IVG) | PAM 1.0.0, 1.0.1 |
IBM Verify Gateway (IVG) | WinLogin 1.0.0, 1.0.1 |
Log in to IBM X-Force Exchange / App Exchange and download and install the latest IBM Security Verify Gateway (renamed from IBM Verify Gateway) components. Specifically:
None