IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input. IBM X-Force ID: 212785.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/212785 | VDB Entry Vendor Advisory |
https://www.ibm.com/support/pages/node/6516034 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/212785 | VDB Entry Vendor Advisory |
https://www.ibm.com/support/pages/node/6516034 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/212785 - VDB Entry, Vendor Advisory | |
References | () https://www.ibm.com/support/pages/node/6516034 - Patch, Vendor Advisory |
12 Jul 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-916 |
16 Nov 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-11-15 16:15
Updated : 2024-11-21 06:18
NVD link : CVE-2021-38979
Mitre link : CVE-2021-38979
CVE.ORG link : CVE-2021-38979
JSON object : View
Products Affected
microsoft
- windows
ibm
- security_guardium_key_lifecycle_manager
- aix
- security_key_lifecycle_manager
linux
- linux_kernel
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort