2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2017-1622" ,
"sourceIdentifier" : "psirt@us.ibm.com" ,
"published" : "2018-12-05T17:29:00.227" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T03:22:09.017" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "IBM QRadar SIEM 7.2.8 and 7.3 does not validate, or incorrectly validates, a certificate. This weakness might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. IBM X-force ID: 133120."
} ,
{
"lang" : "es" ,
"value" : "IBM QRadar SIEM 7.2.8 y 7.3 no valida un certificado, o lo hace de forma incorrecta. Esta debilidad podr\u00eda permitir que un atacante suplante una entidad de confianza mediante un ataque de Man-in-the-Middle (MitM). IBM X-Force ID: 133120."
}
] ,
"metrics" : {
"cvssMetricV30" : [
{
2024-12-08 03:06:42 +00:00
"source" : "psirt@us.ibm.com" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.0" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" ,
"baseScore" : 3.7 ,
"baseSeverity" : "LOW" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
2024-12-08 03:06:42 +00:00
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.2 ,
2024-12-08 03:06:42 +00:00
"impactScore" : 1.4
2023-04-24 12:24:31 +02:00
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.0" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" ,
"baseScore" : 7.4 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
2024-12-08 03:06:42 +00:00
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.2 ,
2024-12-08 03:06:42 +00:00
"impactScore" : 5.2
2023-04-24 12:24:31 +02:00
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 4.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-295"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "7.2.0" ,
"versionEndExcluding" : "7.2.8" ,
"matchCriteriaId" : "21BD7B43-20E4-4BB0-8B6A-0279B2A8609A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "7.3.0" ,
"versionEndExcluding" : "7.3.1" ,
"matchCriteriaId" : "4C0334B4-F2FF-4FF2-9332-99A784A1DECB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "4DC5DF5D-8240-46E3-B6B1-53C6537FEA0D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B613958-19C3-47D4-9997-8C9D39A8D1D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p10:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C297E30-FAFB-4432-9FA1-2A6A1B7BC4BB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p11:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9FB83F1-7F90-4308-BAF3-C8FEE34CE97E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p12:*:*:*:*:*:*" ,
"matchCriteriaId" : "1BFCD881-F682-49BA-822A-B2100B0545AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p13:*:*:*:*:*:*" ,
"matchCriteriaId" : "6E33BA32-7A94-4844-A1BA-E6E1F4BA693E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p3:*:*:*:*:*:*" ,
"matchCriteriaId" : "7DD604D9-46CC-4A6F-ABE3-7461CB1C66B9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p4:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4FDCCEB-F357-4DB4-8BD8-57A658993A1C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p5:*:*:*:*:*:*" ,
"matchCriteriaId" : "6D22B95D-B523-4065-B5EA-8BA8DD5AA854"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p6:*:*:*:*:*:*" ,
"matchCriteriaId" : "E8ECD101-34AB-4E19-B436-A2991BBE687F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p7:*:*:*:*:*:*" ,
"matchCriteriaId" : "2980D256-32C5-4F05-8FA4-B29AF42E31A8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p8:*:*:*:*:*:*" ,
"matchCriteriaId" : "459B769B-8407-483B-8122-64E10DBC9CF0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p9:*:*:*:*:*:*" ,
"matchCriteriaId" : "9FC4F686-B150-4647-8AE3-A85FCC64D773"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "686839F1-5170-412A-A35A-2C757ECE0836"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "29774363-82E3-47FB-A8C5-8636ADA784AC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "C09571F4-70DF-49D2-AED1-4AB4D7E7F193"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p3:*:*:*:*:*:*" ,
"matchCriteriaId" : "05254BF1-A6D1-4BFA-B4E7-7B50FBC68192"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p4:*:*:*:*:*:*" ,
"matchCriteriaId" : "2B428267-8C01-4A9E-A700-0182CA3A9FB9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p5:*:*:*:*:*:*" ,
"matchCriteriaId" : "33547012-E214-46A5-8CFB-F8042620A00F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p6:*:*:*:*:*:*" ,
"matchCriteriaId" : "809CD77D-AE15-4F1A-AE31-19A44233B434"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/133120" ,
"source" : "psirt@us.ibm.com" ,
"tags" : [
"VDB Entry" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10742713" ,
"source" : "psirt@us.ibm.com" ,
"tags" : [
2024-12-08 03:06:42 +00:00
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/133120" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"VDB Entry" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10742713" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
2023-04-24 12:24:31 +02:00
]
}
]
}