CVE-2020-4965

IBM Jazz Team Server products use weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 192422.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:doors_next:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:doors_next:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_insights:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_insights:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_workflow_management:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:removable_media_management:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:removable_media_management:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:removable_media_management:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:removable_media_management:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:removable_media_management:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6.1:*:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-326 CWE-327

13 Apr 2021, 19:42

Type Values Removed Values Added
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/192422 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/192422 - VDB Entry
References (CONFIRM) https://www.ibm.com/support/pages/node/6441803 - (CONFIRM) https://www.ibm.com/support/pages/node/6441803 - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-326
CPE cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:doors_next:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:removable_media_management:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_insights:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_workflow_management:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:removable_media_management:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:doors_next:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_insights:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:removable_media_management:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:removable_media_management:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:removable_media_management:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:*

12 Apr 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-04-12 18:15

Updated : 2023-12-10 13:55


NVD link : CVE-2020-4965

Mitre link : CVE-2020-4965

CVE.ORG link : CVE-2020-4965


JSON object : View

Products Affected

ibm

  • collaborative_lifecycle_management
  • rational_engineering_lifecycle_manager
  • rational_quality_manager
  • engineering_requirements_management_doors_next
  • engineering_workflow_management
  • engineering_insights
  • removable_media_management
  • doors_next
  • rational_team_concert
  • engineering_test_management
  • rhapsody_model_manager
  • engineering_lifecycle_management
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm