Vulnerabilities > IBM > Security Verify Access > 10.0.2

DATE CVE VULNERABILITY TITLE RISK
2025-01-20 CVE-2024-45647 Unspecified vulnerability in IBM products
IBM Security Verify Access 10.0.0 through 10.0.8 and IBM Security Verify Access Docker 10.0.0 through 10.0.8 could allow could an unverified user to change the password of an expired user without prior knowledge of that password.
network
low complexity
ibm
critical
9.8
2024-11-29 CVE-2024-49803 OS Command Injection vulnerability in IBM Security Verify Access
IBM Security Verify Access Appliance 10.0.0 through 10.0.8 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request.
network
low complexity
ibm CWE-78
8.8
2024-11-29 CVE-2024-49804 Unspecified vulnerability in IBM Security Verify Access
IBM Security Verify Access Appliance 10.0.0 through 10.0.8 could allow a locally authenticated non-administrative user to escalate their privileges due to unnecessary permissions used to perform certain tasks.
local
low complexity
ibm
7.8
2024-11-29 CVE-2024-49805 Use of Hard-coded Credentials vulnerability in IBM Security Verify Access
IBM Security Verify Access Appliance 10.0.0 through 10.0.8 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
network
low complexity
ibm CWE-798
critical
9.8
2024-11-29 CVE-2024-49806 Use of Hard-coded Credentials vulnerability in IBM Security Verify Access
IBM Security Verify Access Appliance 10.0.0 through 10.0.8 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
network
low complexity
ibm CWE-798
critical
9.8
2024-08-29 CVE-2024-35133 Open Redirect vulnerability in IBM products
IBM Security Verify Access 10.0.0 through 10.0.8 OIDC Provider could allow a remote authenticated attacker to conduct phishing attacks, using an open redirect attack.
network
low complexity
ibm CWE-601
8.2
2024-06-27 CVE-2023-30430 Unspecified vulnerability in IBM Security Verify Access
IBM Security Verify Access 10.0.0 through 10.0.7.1 could allow a local user to obtain sensitive information from trace logs.
local
low complexity
ibm
5.5
2024-06-27 CVE-2024-31883 Unspecified vulnerability in IBM Security Verify Access
IBM Security Verify Access 10.0.0.0 through 10.0.7.1, under certain configurations, could allow an unauthenticated attacker to cause a denial of service due to asymmetric resource consumption.
network
high complexity
ibm
5.9
2024-04-10 CVE-2024-31871 Unspecified vulnerability in IBM Security Verify Access
IBM Security Verify Access Appliance 10.0.0 through 10.0.7 could allow a malicious actor to conduct a man in the middle attack when deploying Python scripts due to improper certificate validation.
network
high complexity
ibm
8.1
2024-04-10 CVE-2024-31872 Unspecified vulnerability in IBM Security Verify Access
IBM Security Verify Access Appliance 10.0.0 through 10.0.7 could allow a malicious actor to conduct a man in the middle attack when deploying Open Source scripts due to missing certificate validation.
network
high complexity
ibm
8.1