IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses default credentials for potentially critical functionality.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Sep 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ibm aix
Linux Linux linux Kernel Microsoft Microsoft windows |
|
CPEs | cpe:2.3:a:ibm:sterling_connect_direct_web_services:*:*:*:*:*:*:*:* cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Ibm aix
Linux Linux linux Kernel Microsoft Microsoft windows |
Sun, 01 Sep 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 31 Aug 2024 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses default credentials for potentially critical functionality. | |
Title | IBM Sterling Connect:Direct Web Services information disclosure | |
First Time appeared |
Ibm
Ibm sterling Connect Direct Web Services |
|
Weaknesses | CWE-1392 | |
CPEs | cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.0.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.0.0.0:*:*:*:*:windows:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.1.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.1.0.0:*:*:*:*:windows:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.2.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.2.0.0:*:*:*:*:windows:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.3.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.3.0.0:*:*:*:*:windows:*:* |
|
Vendors & Products |
Ibm
Ibm sterling Connect Direct Web Services |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2024-09-01T21:30:21.072Z
Reserved: 2024-06-28T09:34:46.057Z
Link: CVE-2024-39747

Updated: 2024-09-01T21:30:12.940Z

Status : Analyzed
Published: 2024-08-31T02:15:12.243
Modified: 2024-09-16T17:13:47.497
Link: CVE-2024-39747

No data.