IBM MQ Container 3.0.0, 3.0.1, 3.1.0 through 3.1.3 CD, 2.0.0 LTS through 2.0.22 LTS and 2.4.0 through 2.4.8, 2.3.0 through 2.3.3, 2.2.0 through 2.2.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.ibm.com/support/pages/node/7157667 |
![]() ![]() |
History
Mon, 18 Aug 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ibm supplied Mq Advanced Container Images
|
|
CPEs | cpe:2.3:a:ibm:mq_operator:*:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:*:*:*:*:cd:*:*:* cpe:2.3:a:ibm:mq_operator:*:*:*:*:lts:*:*:* cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:cd:*:*:* cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:cd:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.1:r1-eus:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.1:r1-eus:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.2:r1-eus:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.2:r1-eus:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.2:r2-eus:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.2:r2-eus:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.4:r1-eus:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.4:r1-eus:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r1-eus:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r1-eus:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r2-eus:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r2-eus:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r3-eus:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.5:r3-eus:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r1-eus:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r1-eus:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r2-eus:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r2-eus:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r3-eus:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.0.6:r3-eus:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.3.0:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.4.0:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.4.0:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r2:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r2:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r3:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.2.5.0:r3:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r2:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r2:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r3:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.0:r3:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.10:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.10:r2:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.11:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.11:r2:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.15:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.16:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.16:r2:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.17:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.17:r2:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r2:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r2:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r3:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r3:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r4:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.1:r4:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.3:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.3:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r2:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.4:r2:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r2:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r2:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r3:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.5:r3:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.6:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.0.6:r1:*:*:lts:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.1.0:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.1.0:r2:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.1.0:r3:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.1.1:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.2.0:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.2.0:r2:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.2.1:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.2.1:r2:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.0:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.0:r2:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.1:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.1:r2:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.2:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.2:r2:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.2:r3:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.3:r1:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.3.3:r2:*:*:-:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.4.0:r1:*:*:cd:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.4.1:r1:*:*:cd:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.5.0:r1:*:*:cd:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.5.0:r2:*:*:cd:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.5.1:r1:*:*:cd:*:*:* cpe:2.3:a:ibm:supplied_mq_advanced_container_images:9.3.5.1:r2:*:*:cd:*:*:* |
|
Vendors & Products |
Ibm supplied Mq Advanced Container Images
|
Mon, 27 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 27 Jan 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | IBM MQ Container 3.0.0, 3.0.1, 3.1.0 through 3.1.3 CD, 2.0.0 LTS through 2.0.22 LTS and 2.4.0 through 2.4.8, 2.3.0 through 2.3.3, 2.2.0 through 2.2.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | |
Title | IBM MQ Operator information disclosure | |
First Time appeared |
Ibm
Ibm mq Operator |
|
Weaknesses | CWE-327 | |
CPEs | cpe:2.3:a:ibm:mq_operator:2.0.0:*:*:*:lts:*:*:* cpe:2.3:a:ibm:mq_operator:2.0.22:*:*:*:lts:*:*:* cpe:2.3:a:ibm:mq_operator:2.2.0:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:2.2.2:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:2.3.0:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:2.3.3:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:2.4.0:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:2.4.8:*:*:*:-:*:*:* cpe:2.3:a:ibm:mq_operator:3.0.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.0.1:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.1.0:*:*:*:continuous_delivery:*:*:* cpe:2.3:a:ibm:mq_operator:3.1.3:*:*:*:continuous_delivery:*:*:* |
|
Vendors & Products |
Ibm
Ibm mq Operator |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ibm
Published: 2025-01-27T16:27:53.275Z
Updated: 2025-02-18T19:29:12.435Z
Reserved: 2024-02-22T01:26:15.968Z
Link: CVE-2024-27256

Updated: 2025-01-27T16:40:02.536Z

Status : Analyzed
Published: 2025-01-27T17:15:15.443
Modified: 2025-08-18T18:17:32.523
Link: CVE-2024-27256

No data.