
Cloud Vulnerability DB
A community-led vulnerabilities database
IBM Security Guardium 11.2 contains a vulnerability where user credentials are stored in plain clear text which can be read by a local user. The vulnerability was assigned CVE-2021-20389 and was disclosed in 2021. The affected systems include IBM Security Guardium versions 10.5 through 11.3 (IBM Security).
The vulnerability has a CVSS base score of 5.1 with vector CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N. This indicates local access is required, high attack complexity, no privileges required, no user interaction needed, unchanged scope, high confidentiality impact, and no impact to integrity or availability (IBM Security).
The vulnerability allows local users to access credentials stored in plain text format, potentially exposing sensitive authentication information. This could lead to unauthorized access to user accounts if the credentials are compromised (IBM Security).
IBM has released patches for all affected versions of Security Guardium (10.5 through 11.3). Users should update to the latest patched versions available through IBM Fix Central. For version 11.2 specifically, the fix is available in bundle SqlGuard11.0p250Bundle_Jul-14-2021 (IBM Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."