CVE-2018-1466
Severity CVSS v4.0:
Pending analysis
Type:
CWE-326
Inadequate Encryption Strength
Publication date:
17/05/2018
Last modified:
19/08/2020
Description
IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products (6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) use weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 140397.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
3.50
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* | 6.1.0.0 (including) | 7.5.0.14 (excluding) |
cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* | 7.7.0.0 (including) | 7.7.1.9 (excluding) |
cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* | 7.8.0.0 (including) | 7.8.1.6 (excluding) |
cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* | 8.1.1.0 (including) | 8.1.1.2 (excluding) |
cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* | 8.1.2.0 (including) | 8.1.2.1 (excluding) |
cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* | 6.1.0.0 (including) | 7.5.0.14 (excluding) |
cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* | 7.7.0.0 (including) | 7.7.1.9 (excluding) |
cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* | 7.8.0.0 (including) | 7.8.1.6 (excluding) |
cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* | 8.1.1.0 (including) | 8.1.1.2 (excluding) |
cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* | 8.1.2.0 (including) | 8.1.2.1 (excluding) |
cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:* | 6.1.0.0 (including) | 7.5.0.14 (excluding) |
cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:* | 7.7.0.0 (including) | 7.7.1.9 (excluding) |
cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:* | 7.8.0.0 (including) | 7.8.1.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page