cvelist/2023/27xxx/CVE-2023-27557.json

113 lines
4.2 KiB
JSON
Raw Normal View History

2023-03-02 21:00:36 +00:00
{
2023-04-28 02:00:36 +00:00
"data_version": "4.0",
2023-03-02 21:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-27557",
2023-04-28 02:00:36 +00:00
"ASSIGNER": "psirt@us.ibm.com",
"STATE": "PUBLIC"
2023-03-02 21:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-04-28 02:00:36 +00:00
"value": "IBM Counter Fraud Management for Safer Payments 6.1.0.00 through 6.1.1.02, 6.2.0.00 through 6.2.2.02, 6.3.0.00 through 6.3.1.02, 6.4.0.00 through 6.4.2.01, and 6.5.0.00 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 249192."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-327 Use of a Broken or Risky Cryptographic Algorithm",
"cweId": "CWE-327"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"product_name": "Safer Payments",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "6.1.0.00",
"version_value": "6.1.1.02"
},
{
"version_affected": "<=",
"version_name": "6.2.0.00",
"version_value": "6.2.2.02"
},
{
"version_affected": "<=",
"version_name": "6.3.0.00",
"version_value": "6.3.1.02"
},
{
"version_affected": "<=",
"version_name": "6.4.0.00",
"version_value": "6.4.2.01"
},
{
"version_affected": "=",
"version_value": "6.5.0.00"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.ibm.com/support/pages/node/6985603",
"refsource": "MISC",
"name": "https://www.ibm.com/support/pages/node/6985603"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/249192",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/249192"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
2023-03-02 21:00:36 +00:00
}
]
}
}