CVE Vulnerabilities

CVE-2017-1601

Weak Password Requirements

Published: May 02, 2018 | Modified: Oct 03, 2019
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

IBM Security Guardium 10.0, 10.0.1, and 10.1 through 10.1.4 Database Activity Monitor does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 132624.

Weakness

The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.

Affected Software

Name Vendor Start Version End Version
Security_guardium_database_activity_monitor Ibm 10.0 (including) 10.0 (including)
Security_guardium_database_activity_monitor Ibm 10.0.1 (including) 10.0.1 (including)
Security_guardium_database_activity_monitor Ibm 10.1 (including) 10.1 (including)
Security_guardium_database_activity_monitor Ibm 10.1.2 (including) 10.1.2 (including)
Security_guardium_database_activity_monitor Ibm 10.1.3 (including) 10.1.3 (including)
Security_guardium_database_activity_monitor Ibm 10.1.4 (including) 10.1.4 (including)

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References