Use of a broken or risky cryptographic algorithm in IBM Tivoli Netcool/OMNIbus WebGUI



Published: 2024-04-16
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-50313
CWE-ID CWE-327
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
IBM Tivoli Netcool/OMNIbus WebGUI
Server applications / Other server solutions

Vendor IBM Corporation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use of a broken or risky cryptographic algorithm

EUVDB-ID: #VU88120

Risk: Low

CVSSv3.1: 4.2 [CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-50313

CWE-ID: CWE-327 - Use of a Broken or Risky Cryptographic Algorithm

Exploit availability: No

Description

The vulnerability allows an attacker in adjacent network to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. An attacker in adjacent network can gain unauthorized access to sensitive information on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Tivoli Netcool/OMNIbus WebGUI: All versions

External links

http://www.ibm.com/support/pages/node/7148334


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###