Description
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Published: 2024-08-22
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-38224 IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
History

Fri, 13 Mar 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Ibm sterling Connect\
CPEs cpe:2.3:a:ibm:sterling_connect:direct:6.0.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.0.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.1.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.1.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.2.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.2.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.3.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.3.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:ibm:sterling_connect\:direct:6.0.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect\:direct:6.0.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:ibm:sterling_connect\:direct:6.1.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect\:direct:6.1.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:ibm:sterling_connect\:direct:6.2.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect\:direct:6.2.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:ibm:sterling_connect\:direct:6.3.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect\:direct:6.3.0.0:*:*:*:*:windows:*:*
Vendors & Products Ibm sterling Connect
Ibm sterling Connect\

Fri, 23 Aug 2024 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Ibm aix
Ibm sterling Connect Direct Web Services
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.3.0:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Ibm aix
Ibm sterling Connect Direct Web Services
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Thu, 22 Aug 2024 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Aug 2024 11:15:00 +0000

Type Values Removed Values Added
Description IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Title IBM Sterling Connect:Direct Web Services information disclosure
First Time appeared Ibm
Ibm sterling Connect
Weaknesses CWE-327
CPEs cpe:2.3:a:ibm:sterling_connect:direct:6.0.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.0.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.1.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.1.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.2.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.2.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.3.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect:direct:6.3.0.0:*:*:*:*:windows:*:*
Vendors & Products Ibm
Ibm sterling Connect
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Ibm Aix Sterling Connect\ Sterling Connect Direct Web Services
Linux Linux Kernel
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2026-03-13T22:05:03.051Z

Reserved: 2024-06-28T09:34:46.056Z

Link: CVE-2024-39745

cve-icon Vulnrichment

Updated: 2024-08-22T13:33:24.999Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-22T11:15:13.710

Modified: 2024-08-23T15:25:13.470

Link: CVE-2024-39745

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses