IBM API Connect 5.0.0.0 could allow a user to bypass policy restrictions and create non-compliant passwords which could be intercepted and decrypted using man in the middle techniques. IBM X-Force ID: 127160.
The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Api_connect | Ibm | 5.0.0.0 (including) | 5.0.0.0 (including) |
Api_connect | Ibm | 5.0.0.1 (including) | 5.0.0.1 (including) |
Api_connect | Ibm | 5.0.1.0 (including) | 5.0.1.0 (including) |
Api_connect | Ibm | 5.0.2.0 (including) | 5.0.2.0 (including) |
Api_connect | Ibm | 5.0.3.0 (including) | 5.0.3.0 (including) |
Api_connect | Ibm | 5.0.4.0 (including) | 5.0.4.0 (including) |
Api_connect | Ibm | 5.0.5.0 (including) | 5.0.5.0 (including) |
Api_connect | Ibm | 5.0.6.0 (including) | 5.0.6.0 (including) |
Api_connect | Ibm | 5.0.6.1 (including) | 5.0.6.1 (including) |
Api_connect | Ibm | 5.0.6.2 (including) | 5.0.6.2 (including) |
Api_connect | Ibm | 5.0.7.0 (including) | 5.0.7.0 (including) |
A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:
Depending on the threat model, the password policy may include several additional attributes.
See NIST 800-63B [REF-1053] for further information on password requirements.