Weak crypto in IBM Sterling External Authentication Server 6.1.0 & Secure Proxy 6.0.3
CVE-2022-35720 Published on February 8, 2023

IBM Sterling External Authentication Server information disclosure
IBM Sterling External Authentication Server 6.1.0 and IBM Sterling Secure Proxy 6.0.3 uses weaker than expected cryptographic algorithms during installation that could allow a local attacker to decrypt sensitive information. IBM X-Force ID: 231373.

Vendor Advisory Vendor Advisory NVD

Vulnerability Analysis

CVE-2022-35720 is exploitable with local system access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity and availability.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
NONE
Availability Impact:
NONE

Weakness Type

Use of a Broken or Risky Cryptographic Algorithm

The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information. The use of a non-standard algorithm is dangerous because a determined attacker may be able to break the algorithm and compromise whatever data has been protected. Well-known techniques may exist to break the algorithm.


Products Associated with CVE-2022-35720

Want to know whenever a new CVE is published for IBM Sterling External Authentication Server? stack.watch will email you.

 

Affected Versions

IBM Sterling External Authentication Server: IBM Sterling Secure Proxy:

Exploit Probability

EPSS
0.05%
Percentile
13.70%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.