Jul 23, 2020 8:00 pm EDT | High Severity
When the IBM Verify Gateway (IVG) components make API calls, there is insufficient protection of tenant secrets. It's possible for an attacker to obtain the access token belonging to another tenant and issue an API while impersonating that tenant. As of v1.0.1 of IVG for RADIUS and IVG for AIX PAM, and v1.0.2 of IVG for Linux PAM and IVG for Windows Login, the client API secrets, access tokens, and cookies are scrubbed so that they cannot be captured for replay in another API call. ...read more
from IBM Product Security Incident Response Team https://ift.tt/3hwVRjh
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.