IBM Security Guardium Key Lifecycle Manager 4.1, 4.1.1, 4.2.0, and 4.2.1 could allow a remote attacker to obtain sensitive information in cleartext in a communication channel that can be sniffed by unauthorized actors.
References
Link | Resource |
---|---|
https://www.ibm.com/support/pages/node/7175067 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
10 Jan 2025, 17:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.2.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.2.0:*:*:*:*:*:*:* |
|
First Time |
Ibm
Ibm security Guardium Key Lifecycle Manager |
|
References | () https://www.ibm.com/support/pages/node/7175067 - Vendor Advisory |
17 Dec 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-17 18:15
Updated : 2025-01-10 17:52
NVD link : CVE-2024-49819
Mitre link : CVE-2024-49819
CVE.ORG link : CVE-2024-49819
JSON object : View
Products Affected
ibm
- security_guardium_key_lifecycle_manager
CWE
CWE-319
Cleartext Transmission of Sensitive Information