IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 133559.
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Security_key_lifecycle_manager | Ibm | 2.5.0 (including) | 2.5.0 (including) |
Security_key_lifecycle_manager | Ibm | 2.5.0.0 (including) | 2.5.0.0 (including) |
Security_key_lifecycle_manager | Ibm | 2.5.0.1 (including) | 2.5.0.1 (including) |
Security_key_lifecycle_manager | Ibm | 2.5.0.2 (including) | 2.5.0.2 (including) |
Security_key_lifecycle_manager | Ibm | 2.5.0.3 (including) | 2.5.0.3 (including) |
Security_key_lifecycle_manager | Ibm | 2.5.0.4 (including) | 2.5.0.4 (including) |
Security_key_lifecycle_manager | Ibm | 2.5.0.5 (including) | 2.5.0.5 (including) |
Security_key_lifecycle_manager | Ibm | 2.5.0.6 (including) | 2.5.0.6 (including) |
Security_key_lifecycle_manager | Ibm | 2.5.0.7 (including) | 2.5.0.7 (including) |
Security_key_lifecycle_manager | Ibm | 2.5.0.8 (including) | 2.5.0.8 (including) |
Security_key_lifecycle_manager | Ibm | 2.6.0 (including) | 2.6.0 (including) |
Security_key_lifecycle_manager | Ibm | 2.6.0.1 (including) | 2.6.0.1 (including) |
Security_key_lifecycle_manager | Ibm | 2.6.0.2 (including) | 2.6.0.2 (including) |
Security_key_lifecycle_manager | Ibm | 2.6.0.3 (including) | 2.6.0.3 (including) |
Security_key_lifecycle_manager | Ibm | 2.7.0 (including) | 2.7.0 (including) |
Security_key_lifecycle_manager | Ibm | 2.7.0.1 (including) | 2.7.0.1 (including) |
Security_key_lifecycle_manager | Ibm | 2.7.0.2 (including) | 2.7.0.2 (including) |