CVE Vulnerabilities

CVE-2025-1993

Weak Password Requirements

Published: May 09, 2025 | Modified: Aug 20, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

IBM App Connect Enterprise Certified Container 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, 12.7, 12.8, 12.9, and 12.10 DesignerAuthoring instances store their flows in a database that is protected by weaker than expected cryptographic algorithms that could be decrypted by a local user.

Weakness

The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.

Affected Software

Name Vendor Start Version End Version
App_connect_enterprise_certified_containers_operands Ibm 12.0.7.0-r4 (including) 12.0.7.0-r4 (including)
App_connect_enterprise_certified_containers_operands Ibm 12.0.11.1-r1 (including) 12.0.11.1-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 12.0.11.2-r1 (including) 12.0.11.2-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 12.0.11.3-r1 (including) 12.0.11.3-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 12.0.12-r1 (including) 12.0.12-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 12.0.12-r10 (including) 12.0.12-r10 (including)
App_connect_enterprise_certified_containers_operands Ibm 12.0.12.0-r1 (including) 12.0.12.0-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 12.0.12.0-r2 (including) 12.0.12.0-r2 (including)
App_connect_enterprise_certified_containers_operands Ibm 12.0.12.2-r1 (including) 12.0.12.2-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 12.0.12.3-r1 (including) 12.0.12.3-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 12.0.12.4-r1 (including) 12.0.12.4-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 12.0.12.5-r1 (including) 12.0.12.5-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 13.0.1.0-r1 (including) 13.0.1.0-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 13.0.1.0-r2 (including) 13.0.1.0-r2 (including)
App_connect_enterprise_certified_containers_operands Ibm 13.0.1.1-r1 (including) 13.0.1.1-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 13.0.2.0-r1 (including) 13.0.2.0-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 13.0.2.1-r1 (including) 13.0.2.1-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 13.0.2.2-r1 (including) 13.0.2.2-r1 (including)
App_connect_enterprise_certified_containers_operands Ibm 13.0.2.2-r2 (including) 13.0.2.2-r2 (including)
App_connect_operator Ibm 8.1.0 (including) 11.6.0 (including)
App_connect_operator Ibm 12.0.0 (including) 12.10.0 (including)
App_connect_operator Ibm 12.1.0 (including) 12.10.0 (including)

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References