IBM Concert 1.0.0 through 2.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7252019 |
|
History
Mon, 24 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM Concert 1.0.0 through 2.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | |
| Title | IBM Concert Information Disclosure | |
| First Time appeared |
Ibm
Ibm concert |
|
| Weaknesses | CWE-327 | |
| CPEs | cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:concert:2.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm concert |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ibm
Published: 2025-11-24T20:29:19.183Z
Updated: 2025-11-24T20:58:29.449Z
Reserved: 2025-04-15T21:16:20.813Z
Link: CVE-2025-36150
Updated: 2025-11-24T20:58:21.899Z
Status : Awaiting Analysis
Published: 2025-11-24T21:16:03.023
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-36150
No data.