CVE Vulnerabilities

CVE-2017-1386

Weak Password Requirements

Published: Jul 31, 2017 | Modified: Oct 03, 2019
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu

IBM API Connect 5.0.0.0 could allow a user to bypass policy restrictions and create non-compliant passwords which could be intercepted and decrypted using man in the middle techniques. IBM X-Force ID: 127160.

Weakness

The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.

Affected Software

Name Vendor Start Version End Version
Api_connect Ibm 5.0.0.0 (including) 5.0.0.0 (including)
Api_connect Ibm 5.0.0.1 (including) 5.0.0.1 (including)
Api_connect Ibm 5.0.1.0 (including) 5.0.1.0 (including)
Api_connect Ibm 5.0.2.0 (including) 5.0.2.0 (including)
Api_connect Ibm 5.0.3.0 (including) 5.0.3.0 (including)
Api_connect Ibm 5.0.4.0 (including) 5.0.4.0 (including)
Api_connect Ibm 5.0.5.0 (including) 5.0.5.0 (including)
Api_connect Ibm 5.0.6.0 (including) 5.0.6.0 (including)
Api_connect Ibm 5.0.6.1 (including) 5.0.6.1 (including)
Api_connect Ibm 5.0.6.2 (including) 5.0.6.2 (including)
Api_connect Ibm 5.0.7.0 (including) 5.0.7.0 (including)

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References