CVE Vulnerabilities

CVE-2019-4102

Inadequate Encryption Strength

Published: Jul 01, 2019 | Modified: Nov 21, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 158092.

Weakness

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

Affected Software

NameVendorStart VersionEnd Version
Db2Ibm9.7.0.0 (including)9.7.0.0 (including)
Db2Ibm9.7.0.1 (including)9.7.0.1 (including)
Db2Ibm9.7.0.2 (including)9.7.0.2 (including)
Db2Ibm9.7.0.3 (including)9.7.0.3 (including)
Db2Ibm9.7.0.4 (including)9.7.0.4 (including)
Db2Ibm9.7.0.5 (including)9.7.0.5 (including)
Db2Ibm9.7.0.6 (including)9.7.0.6 (including)
Db2Ibm9.7.0.7 (including)9.7.0.7 (including)
Db2Ibm9.7.0.8 (including)9.7.0.8 (including)
Db2Ibm9.7.0.9 (including)9.7.0.9 (including)
Db2Ibm9.7.0.10 (including)9.7.0.10 (including)
Db2Ibm9.7.0.11 (including)9.7.0.11 (including)
Db2Ibm10.1.0.0 (including)10.1.0.0 (including)
Db2Ibm10.1.0.1 (including)10.1.0.1 (including)
Db2Ibm10.1.0.2 (including)10.1.0.2 (including)
Db2Ibm10.1.0.3 (including)10.1.0.3 (including)
Db2Ibm10.1.0.4 (including)10.1.0.4 (including)
Db2Ibm10.1.0.5 (including)10.1.0.5 (including)
Db2Ibm10.1.0.6 (including)10.1.0.6 (including)
Db2Ibm10.5.0.0 (including)10.5.0.0 (including)
Db2Ibm10.5.0.1 (including)10.5.0.1 (including)
Db2Ibm10.5.0.2 (including)10.5.0.2 (including)
Db2Ibm10.5.0.3 (including)10.5.0.3 (including)
Db2Ibm10.5.0.4 (including)10.5.0.4 (including)
Db2Ibm10.5.0.5 (including)10.5.0.5 (including)
Db2Ibm10.5.0.6 (including)10.5.0.6 (including)
Db2Ibm10.5.0.7 (including)10.5.0.7 (including)
Db2Ibm10.5.0.8 (including)10.5.0.8 (including)
Db2Ibm10.5.0.9 (including)10.5.0.9 (including)
Db2Ibm10.5.0.10 (including)10.5.0.10 (including)
Db2Ibm11.1.0.0 (including)11.1.0.0 (including)
Db2Ibm11.1.1.1 (including)11.1.1.1 (including)
Db2Ibm11.1.2.2 (including)11.1.2.2 (including)
Db2Ibm11.1.3.3 (including)11.1.3.3 (including)
Db2Ibm11.1.4.4 (including)11.1.4.4 (including)

Potential Mitigations

References