CVE-2024-27256
27.01.2025, 17:15
IBM MQ Container 3.0.0, 3.0.1, 3.1.0 through 3.1.3 CD, 2.0.0 LTS through 2.0.22 LTS and2.4.0 through 2.4.8, 2.3.0 through 2.3.3, 2.2.0 through 2.2.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.Enginsight
Vendor | Product | Version |
---|---|---|
ibm | mq_operator | 2.0.0 ≤ 𝑥 ≤ 2.0.22 |
ibm | mq_operator | 2.2.0 ≤ 𝑥 ≤ 2.2.2 |
ibm | mq_operator | 2.3.0 ≤ 𝑥 ≤ 2.3.3 |
ibm | mq_operator | 2.4.0 ≤ 𝑥 ≤ 2.4.8 |
ibm | mq_operator | 3.1.0 ≤ 𝑥 ≤ 3.1.3 |
ibm | mq_operator | 3.0.0 |
ibm | mq_operator | 3.0.1 |
ibm | supplied_mq_advanced_container_images | 9.2.0.1:r1-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.1:r1-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.2:r1-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.2:r1-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.2:r2-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.2:r2-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.4:r1-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.4:r1-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.5:r1-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.5:r1-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.5:r2-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.5:r2-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.5:r3-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.5:r3-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.6:r1-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.6:r1-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.6:r2-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.6:r2-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.6:r3-eus |
ibm | supplied_mq_advanced_container_images | 9.2.0.6:r3-eus |
ibm | supplied_mq_advanced_container_images | 9.2.3.0:r1 |
ibm | supplied_mq_advanced_container_images | 9.2.4.0:r1 |
ibm | supplied_mq_advanced_container_images | 9.2.4.0:r1 |
ibm | supplied_mq_advanced_container_images | 9.2.5.0:r1 |
ibm | supplied_mq_advanced_container_images | 9.2.5.0:r1 |
ibm | supplied_mq_advanced_container_images | 9.2.5.0:r2 |
ibm | supplied_mq_advanced_container_images | 9.2.5.0:r2 |
ibm | supplied_mq_advanced_container_images | 9.2.5.0:r3 |
ibm | supplied_mq_advanced_container_images | 9.2.5.0:r3 |
ibm | supplied_mq_advanced_container_images | 9.3.0.0:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.0:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.0:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.0.0:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.0.0:r3 |
ibm | supplied_mq_advanced_container_images | 9.3.0.0:r3 |
ibm | supplied_mq_advanced_container_images | 9.3.0.1:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.1:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.1:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.0.1:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.0.1:r3 |
ibm | supplied_mq_advanced_container_images | 9.3.0.1:r3 |
ibm | supplied_mq_advanced_container_images | 9.3.0.1:r4 |
ibm | supplied_mq_advanced_container_images | 9.3.0.1:r4 |
ibm | supplied_mq_advanced_container_images | 9.3.0.3:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.3:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.4:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.4:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.4:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.0.4:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.0.5:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.5:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.5:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.0.5:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.0.5:r3 |
ibm | supplied_mq_advanced_container_images | 9.3.0.5:r3 |
ibm | supplied_mq_advanced_container_images | 9.3.0.6:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.6:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.10:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.10:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.0.11:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.11:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.0.15:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.16:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.16:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.0.17:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.0.17:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.1.0:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.1.0:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.1.0:r3 |
ibm | supplied_mq_advanced_container_images | 9.3.1.1:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.2.0:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.2.0:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.2.1:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.2.1:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.3.0:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.3.0:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.3.1:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.3.1:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.3.2:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.3.2:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.3.2:r3 |
ibm | supplied_mq_advanced_container_images | 9.3.3.3:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.3.3:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.4.0:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.4.1:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.5.0:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.5.0:r2 |
ibm | supplied_mq_advanced_container_images | 9.3.5.1:r1 |
ibm | supplied_mq_advanced_container_images | 9.3.5.1:r2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration