CVE-2020-4699
Vulnerability Scoring
Attack Complexity Details
- Attack Complexity: HIGH IMPACT
- Attack Vector: ADJACENT_NETWORK
- Privileges Required: None
- Scope: UNCHANGED
- User Interaction: NONE
CIA Impact Definition
- Confidentiality: HIGH IMPACT
- Integrity:
- Availability:
CVE-2020-4699 Vulnerability Summary
IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 could allow an attacker to obtain sensitive using timing side channel attacks which could aid in further attacks against the system. IBM X-Force ID: 186947.
Access Complexity Graph for CVE-2020-4699
Impact Analysis for CVE-2020-4699
CVE-2020-4699: Detailed Information and External References
EPSS
0.00051
EPSS %
0.22650
References
0.00051
- https://exchange.xforce.ibmcloud.com/vulnerabilities/186947
- https://www.ibm.com/support/pages/node/6346619
CWE
CWE-203
CAPEC
0.00051
- Black Box Reverse Engineering: An adversary discovers the structure, function, and composition of a type of computer software through black box analysis techniques. 'Black Box' methods involve interacting with the software indirectly, in the absence of direct access to the executable object. Such analysis typically involves interacting with the software at the boundaries of where the software interfaces with a larger execution environment, such as input-output vectors, libraries, or APIs. Black Box Reverse Engineering also refers to gathering physical side effects of a hardware device, such as electromagnetic radiation or sounds.
Vulnerable Configurations
-
cpe:2.3:a:ibm:security_access_manager:9.0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_access_manager:9.0.7.0:*:*:*:*:*:*:*
-
cpe:2.3:a:ibm:security_verify_access:10.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.0:*:*:*:*:*:*:*
CVSS3 Source
nvd@nist.gov
CVSS3 Type
Primary
CVSS3 Vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Protect Your Infrastructure: Combat Critical CVE Threats
Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.