The IBM Verify Gateway (IVG) components do not prevent rapid, excessive attempts to authenticate with a time-based one-time password (TOTP). Consequently, an attacker could brute force account credentials. As of v1.0.1 of IVG for RADIUS and IVG for AIX PAM, and v1.0.2 of IVG for Linux PAM and IVG for Windows Login, a throttling mechanism has been added to remediate this vulnerability.
CVEID:CVE-2020-4400
**DESCRIPTION:**IBM Verify Gateway (IVG) uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/179478 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM Verify Gateway (IVG) | RADIUS 1.0.0 |
IBM Verify Gateway (IVG) | PAM 1.0.0, 1.0.1 |
IBM Verify Gateway (IVG) | WinLogin 1.0.0, 1.0.1 |
Log in to IBM X-Force Exchange / App Exchange and download and install the latest IBM Security Verify Gateway (renamed from IBM Verify Gateway) components. Specifically:
None