Vulnerability Description
The Web Server Plug-in in IBM WebSphere Application Server (WAS) 8.0 and earlier uses unencrypted HTTP communication after expiration of the plugin-key.kdb password, which allows remote attackers to obtain sensitive information by sniffing the network, or spoof arbitrary servers via a man-in-the-middle attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ibm | Websphere Application Server | <= 8.0.0.0 |
Related Weaknesses (CWE)
References
- http://www-01.ibm.com/support/docview.wss?uid=swg21588312
- http://www-01.ibm.com/support/docview.wss?uid=swg21591172Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74900
- http://www-01.ibm.com/support/docview.wss?uid=swg21588312
- http://www-01.ibm.com/support/docview.wss?uid=swg21591172Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74900
FAQ
What is CVE-2012-2162?
CVE-2012-2162 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The Web Server Plug-in in IBM WebSphere Application Server (WAS) 8.0 and earlier uses unencrypted HTTP communication after expiration of the plugin-key.kdb password, which allows remote attackers to o...
How severe is CVE-2012-2162?
CVE-2012-2162 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-2162?
Check the references section above for vendor advisories and patch information. Affected products include: Ibm Websphere Application Server.