IBM MQ Container 3.0.0, 3.0.1, 3.1.0 through 3.1.3 CD, 2.0.0 LTS through 2.0.22 LTS and 2.4.0 through 2.4.8, 2.3.0 through 2.3.3, 2.2.0 through 2.2.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.ibm.com/support/pages/node/7157667 |
![]() ![]() |
History
Mon, 27 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 27 Jan 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | IBM MQ Container 3.0.0, 3.0.1, 3.1.0 through 3.1.3 CD, 2.0.0 LTS through 2.0.22 LTS and 2.4.0 through 2.4.8, 2.3.0 through 2.3.3, 2.2.0 through 2.2.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | |
Title | IBM MQ Operator information disclosure | |
First Time appeared |
Ibm
Ibm mq Operator |
|
Weaknesses | CWE-327 | |
CPEs | cpe:2.3:a:ibm:mq_operator:2.0.0:*:*:*:lts:*:*:* cpe:2.3:a:ibm:mq_operator:2.0.22:*:*:*:lts:*:*:* cpe:2.3:a:ibm:mq_operator:2.2.0:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:2.2.2:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:2.3.0:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:2.3.3:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:2.4.0:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:2.4.8:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.1.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.1.3:*:*:*:continuous_delivery:*:*:* |
|
Vendors & Products |
Ibm
Ibm mq Operator |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2025-02-18T19:29:12.435Z
Reserved: 2024-02-22T01:26:15.968Z
Link: CVE-2024-27256

Updated: 2025-01-27T16:40:02.536Z

Status : Awaiting Analysis
Published: 2025-01-27T17:15:15.443
Modified: 2025-02-18T20:15:18.073
Link: CVE-2024-27256

No data.