IBM Security SOAR uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
The product uses a broken or risky cryptographic algorithm or protocol.
Link | Tags |
---|---|
https://www.ibm.com/support/pages/node/6482585 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/200660 | vdb entry vendor advisory |