CVE-2021-38890
 
Severity Score
7.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
IBM Sterling Connect:Direct Web Services 1.0 and 6.0 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 209507.
IBM Sterling Connect:Direct Web Services versiones 1.0 y 6.0, usa una configuración de bloqueo de cuenta inapropiada que podrÃa permitir a un atacante remoto forzar las credenciales de la cuenta. IBM X-Force ID: 209507
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2021-08-16 CVE Reserved
- 2021-11-23 CVE Published
- 2024-09-17 CVE Updated
- 2024-11-26 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-307: Improper Restriction of Excessive Authentication Attempts
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.ibm.com/support/pages/node/6518586 | 2021-11-29 |
URL | Date | SRC |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/209507 | 2021-11-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ibm Search vendor "Ibm" | Sterling Connect:direct Search vendor "Ibm" for product "Sterling Connect:direct" | >= 6.0.0 < 6.2.0.1 Search vendor "Ibm" for product "Sterling Connect:direct" and version " >= 6.0.0 < 6.2.0.1" | - |
Affected
| in | Ibm Search vendor "Ibm" | Aix Search vendor "Ibm" for product "Aix" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Sterling Connect:direct Search vendor "Ibm" for product "Sterling Connect:direct" | >= 6.0.0 < 6.2.0.1 Search vendor "Ibm" for product "Sterling Connect:direct" and version " >= 6.0.0 < 6.2.0.1" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Sterling Connect:direct Search vendor "Ibm" for product "Sterling Connect:direct" | >= 6.0.0 < 6.2.0.1 Search vendor "Ibm" for product "Sterling Connect:direct" and version " >= 6.0.0 < 6.2.0.1" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Sterling Connect:direct Search vendor "Ibm" for product "Sterling Connect:direct" | >= 6.0.0 < 6.2.0.1 Search vendor "Ibm" for product "Sterling Connect:direct" and version " >= 6.0.0 < 6.2.0.1" | - |
Affected
| in | Oracle Search vendor "Oracle" | Solaris Search vendor "Oracle" for product "Solaris" | - | - |
Safe
|