CVE-2021-29742
IBM Security Verify Access (formerly ISAM) vulnerability analysis and mitigation

Overview

IBM Security Verify Access Docker 10.0.0 contained a vulnerability (CVE-2021-29742) that could allow a user to impersonate another user on the system. The vulnerability was discovered and disclosed in July 2021, affecting the IBM Security Verify Access Docker container version 10.0.0 (IBM Security Bulletin).

Technical details

The vulnerability has a CVSS base score of 7.9 with vector CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H. This indicates that the vulnerability requires adjacent network access, has high attack complexity, needs no privileges, requires user interaction, and if exploited could lead to high impacts on confidentiality, integrity, and availability with changed scope (IBM Security Bulletin).

Impact

If successfully exploited, this vulnerability allows an attacker to impersonate other users on the system, potentially leading to unauthorized access to sensitive information and system resources. The high CVSS scores for confidentiality, integrity, and availability (all rated as High) indicate severe potential consequences if exploited (IBM Security Bulletin).

Mitigation and workarounds

IBM has released a patch for this vulnerability in version 10.0.2.0 of the IBM Security Verify Access Docker container. Users are advised to update their installations by pulling the latest container from the Docker Hub using the command: docker pull ibmcom/verify-access:10.0.2.0 (IBM Security Bulletin).

Additional resources


SourceThis report was generated using AI

Related IBM Security Verify Access (formerly ISAM) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-36087CRITICAL9.8
  • IBM Security Verify Access (formerly ISAM)IBM Security Verify Access (formerly ISAM)
  • cpe:2.3:a:ibm:security_verify_access
NoNoOct 13, 2025
CVE-2025-36356CRITICAL9.3
  • IBM Security Verify Access (formerly ISAM)IBM Security Verify Access (formerly ISAM)
  • cpe:2.3:a:ibm:security_verify_access
NoNoOct 06, 2025
CVE-2025-36355HIGH8.5
  • IBM Security Verify Access (formerly ISAM)IBM Security Verify Access (formerly ISAM)
  • cpe:2.3:a:ibm:security_verify_access
NoNoOct 06, 2025
CVE-2025-36354HIGH7.3
  • IBM Security Verify Access (formerly ISAM)IBM Security Verify Access (formerly ISAM)
  • cpe:2.3:a:ibm:security_verify_access
NoNoOct 06, 2025
CVE-2025-0163MEDIUM5.3
  • IBM Security Verify Access (formerly ISAM)IBM Security Verify Access (formerly ISAM)
  • cpe:2.3:a:ibm:security_verify_access
NoYesJun 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management