IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 126859.
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Security_identity_governance_and_intelligence | Ibm | 5.2 (including) | 5.2 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.1 (including) | 5.2.1 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.2 (including) | 5.2.2 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.2.1 (including) | 5.2.2.1 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.3 (including) | 5.2.3 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.3.1 (including) | 5.2.3.1 (including) |
Security_identity_governance_and_intelligence | Ibm | 5.2.3.2 (including) | 5.2.3.2 (including) |