Vulnerabilities > IBM > Resilient Security Orchestration Automation AND Response > 38.0

DATE CVE VULNERABILITY TITLE RISK
2021-08-23 CVE-2021-29704 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Resilient Security Orchestration Automation and Response 38.0/38.2
IBM Security SOAR uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
5.0
2021-07-19 CVE-2021-29780 Improper Input Validation vulnerability in IBM Resilient Security Orchestration Automation and Response 38.0/38.2
IBM Resilient OnPrem v41.1 of IBM Security SOAR could allow an authenticated user to perform actions that they should not have access to due to improper input validation.
network
low complexity
ibm CWE-20
6.5
2021-06-16 CVE-2021-20566 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Resilient Security Orchestration Automation and Response 38.0
IBM Resilient SOAR V38.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
5.0
2021-06-16 CVE-2021-20567 Missing Encryption of Sensitive Data vulnerability in IBM Resilient Security Orchestration Automation and Response 38.0
IBM Resilient SOAR V38.0 could allow a local privileged attacker to obtain sensitive information due to improper or nonexisting encryption.IBM X-Force ID: 199239.
local
low complexity
ibm CWE-311
2.1
2020-12-11 CVE-2020-4633 Improper Input Validation vulnerability in IBM Resilient Security Orchestration Automation and Response 38.0
IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.
network
low complexity
ibm CWE-20
critical
9.0
2020-10-29 CVE-2020-4864 Authentication Bypass by Spoofing vulnerability in IBM Resilient Security Orchestration Automation and Response 38.0
IBM Resilient SOAR V38.0 could allow an attacker on the internal net work to provide the server with a spoofed source IP address.
low complexity
ibm CWE-290
3.3
2020-08-28 CVE-2019-4579 Unspecified vulnerability in IBM Resilient Security Orchestration Automation and Response 38.0
IBM Resilient SOAR 38 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity.
network
low complexity
ibm redhat
4.0
2020-08-28 CVE-2019-4533 Improper Input Validation vulnerability in IBM Resilient Security Orchestration Automation and Response 38.0
IBM Resilient SOAR V38.0 users may experience a denial of service of the SOAR Platform due to a insufficient input validation.
network
low complexity
ibm redhat CWE-20
4.0