CVE-2015-5012

EUVD-2015-5029
The SSH implementation on IBM Security Access Manager for Web appliances 7.0 before 7.0.0 FP19, 8.0 before 8.0.1.3 IF3, and 9.0 before 9.0.0.0 IF1 does not properly restrict the set of MAC algorithms, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 50%
Affected Products (NVD)
VendorProductVersion
ibmsecurity_access_manager_9.0_firmware
9.0.0
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.1
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.2
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.3
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.4
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.5
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.6
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.7
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.8
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.9
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.10
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.11
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.12
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.13
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.14
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.15
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.16
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.17
ibmsecurity_access_manager_for_web_7.0_firmware
7.0.0.18
ibmsecurity_access_manager_for_web_8.0_firmware
8.0.0.1
ibmsecurity_access_manager_for_web_8.0_firmware
8.0.0.2
ibmsecurity_access_manager_for_web_8.0_firmware
8.0.0.3
ibmsecurity_access_manager_for_web_8.0_firmware
8.0.0.5
ibmsecurity_access_manager_for_web_8.0_firmware
8.0.1
ibmsecurity_access_manager_for_web_8.0_firmware
8.0.1.0
ibmsecurity_access_manager_for_web_8.0_firmware
8.0.1.2
𝑥
= Vulnerable software versions
Common Weakness Enumeration