CVE Vulnerabilities

CVE-2017-1386

Weak Password Requirements

Published: Jul 31, 2017 | Modified: Apr 20, 2025
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu

IBM API Connect 5.0.0.0 could allow a user to bypass policy restrictions and create non-compliant passwords which could be intercepted and decrypted using man in the middle techniques. IBM X-Force ID: 127160.

Weakness

The product does not require that users should have strong passwords.

Affected Software

Name Vendor Start Version End Version
Api_connect Ibm 5.0.0.0 (including) 5.0.0.0 (including)
Api_connect Ibm 5.0.0.1 (including) 5.0.0.1 (including)
Api_connect Ibm 5.0.1.0 (including) 5.0.1.0 (including)
Api_connect Ibm 5.0.2.0 (including) 5.0.2.0 (including)
Api_connect Ibm 5.0.3.0 (including) 5.0.3.0 (including)
Api_connect Ibm 5.0.4.0 (including) 5.0.4.0 (including)
Api_connect Ibm 5.0.5.0 (including) 5.0.5.0 (including)
Api_connect Ibm 5.0.6.0 (including) 5.0.6.0 (including)
Api_connect Ibm 5.0.6.1 (including) 5.0.6.1 (including)
Api_connect Ibm 5.0.6.2 (including) 5.0.6.2 (including)
Api_connect Ibm 5.0.7.0 (including) 5.0.7.0 (including)

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References